First published: Wed May 17 2023(Updated: )
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <2.6.3 | |
Ibm Infosphere Information Server | <=11.7 | |
pip/apache-airflow | <2.6.3 | 2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-22887 is high with a severity value of 7.
CVE-2023-22887 affects Apache Airflow versions before 2.6.3.
The affected software for CVE-2023-22887 includes Apache Airflow versions before 2.6.3 and IBM InfoSphere Information Server version 11.7.
CVE-2023-22887 is considered a high vulnerability.
To fix CVE-2023-22887, update Apache Airflow to version 2.6.3 and follow the IBM InfoSphere Information Server patch provided by IBM.