CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-29733: Apache Airflow FTP Provider: FTP_TLS instance with unverified SSL context

Description

Improper Certificate Validation vulnerability in Apache Airflow FTP Provider.

The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly.

This issue affects Apache Airflow FTP Provider: before 3.7.0.

Users are recommended to upgrade to version 3.7.0, which fixes the issue.

Classification

CVE ID: CVE-2024-29733

Affected Products

Vendor: Apache Software Foundation

Product: Apache Airflow FTP Provider

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 18.39% (scored less or equal to compared to others)

EPSS Date: 2025-03-14 (when was this score calculated)

References

https://github.com/apache/airflow/pull/38266
https://github.com/apache/airflow/blob/95e26118b828c364755f3a8c96870f3591b01c31/airflow/providers/ftp/hooks/ftp.py#L280
https://docs.python.org/3/library/ssl.html#best-defaults
https://lists.apache.org/thread/265t5zbmtjs6h9fkw52wtp03nsbplky2
http://www.openwall.com/lists/oss-security/2024/04/19/3

Timeline