Improper Certificate Validation vulnerability in Apache Airflow FTP Provider.
The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly.
This issue affects Apache Airflow FTP Provider: before 3.7.0.
Users are recommended to upgrade to version 3.7.0, which fixes the issue.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/04/19/3 | Mailing List Third Party Advisory |
https://docs.python.org/3/library/ssl.html#best-defaults | Technical Description |
https://github.com/apache/airflow/blob/95e26118b828c364755f3a8c96870f3591b01c31/airflow/providers/ftp/hooks/ftp.py#L280 | Product |
https://github.com/apache/airflow/pull/38266 | Issue Tracking |
https://lists.apache.org/thread/265t5zbmtjs6h9fkw52wtp03nsbplky2 | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/04/19/3 | Mailing List Third Party Advisory |
https://docs.python.org/3/library/ssl.html#best-defaults | Technical Description |
https://github.com/apache/airflow/blob/95e26118b828c364755f3a8c96870f3591b01c31/airflow/providers/ftp/hooks/ftp.py#L280 | Product |
https://github.com/apache/airflow/pull/38266 | Issue Tracking |
https://lists.apache.org/thread/265t5zbmtjs6h9fkw52wtp03nsbplky2 | Mailing List Vendor Advisory |
Configurations
History
10 Jul 2025, 18:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:apache-airflow-providers-ftp:*:*:*:*:*:*:*:* | |
First Time |
Apache
Apache apache-airflow-providers-ftp |
|
References | () http://www.openwall.com/lists/oss-security/2024/04/19/3 - Mailing List, Third Party Advisory | |
References | () https://docs.python.org/3/library/ssl.html#best-defaults - Technical Description | |
References | () https://github.com/apache/airflow/blob/95e26118b828c364755f3a8c96870f3591b01c31/airflow/providers/ftp/hooks/ftp.py#L280 - Product | |
References | () https://github.com/apache/airflow/pull/38266 - Issue Tracking | |
References | () https://lists.apache.org/thread/265t5zbmtjs6h9fkw52wtp03nsbplky2 - Mailing List, Vendor Advisory |
13 Feb 2025, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Improper Certificate Validation vulnerability in Apache Airflow FTP Provider. The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly. This issue affects Apache Airflow FTP Provider: before 3.7.0. Users are recommended to upgrade to version 3.7.0, which fixes the issue. |
Information
Published : 2024-04-21 18:15
Updated : 2025-07-10 18:38
NVD link : CVE-2024-29733
Mitre link : CVE-2024-29733
CVE.ORG link : CVE-2024-29733
JSON object : View
Products Affected
apache
- apache-airflow-providers-ftp
CWE
CWE-295
Improper Certificate Validation