Property
Languagepython
Severitymedium
CWECWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
OWASPA01:2017 - Injection
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description#

Using string formatting or concatenation to build Bash commands in Airflow’s BashOperator can let user-controlled input end up in shell commands. This exposes your code to command injection if any variable used is not fully trusted.

Impact#

If exploited, an attacker could execute arbitrary commands on the server running Airflow, potentially leading to data theft, system compromise, or further attacks within your infrastructure. This can result in loss of sensitive information and disruption of services.