CVE-2023-49920

Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent. Users are advised to upgrade to version 2.8.0 or later which is not affected
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

History

28 Dec 2023, 13:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () https://github.com/apache/airflow/pull/36026 - () https://github.com/apache/airflow/pull/36026 - Patch
References () http://www.openwall.com/lists/oss-security/2023/12/21/3 - () http://www.openwall.com/lists/oss-security/2023/12/21/3 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/mnwd2vcfw3gms6ft6kl951vfbqrxsnjq - () https://lists.apache.org/thread/mnwd2vcfw3gms6ft6kl951vfbqrxsnjq - Mailing List, Third Party Advisory
CPE cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
First Time Apache airflow
Apache

21 Dec 2023, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-21 10:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-49920

Mitre link : CVE-2023-49920

CVE.ORG link : CVE-2023-49920


JSON object : View

Products Affected

apache

  • airflow
CWE
CWE-352

Cross-Site Request Forgery (CSRF)