First published: Wed Jul 12 2023(Updated: )
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unauthorized read access to a DAG through the URL. It is recommended to upgrade to a version that is not affected
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <2.6.3 | |
pip/apache-airflow | <2.6.3 | 2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Apache Airflow vulnerability is CVE-2023-35908.
The severity of CVE-2023-35908 is medium with a severity value of 6.5.
CVE-2023-35908 allows unauthorized read access to a DAG through the URL in Apache Airflow versions before 2.6.3.
To fix CVE-2023-35908 in Apache Airflow, it is recommended to upgrade to a version that is not affected, specifically version 2.6.3 or higher.
More information about CVE-2023-35908 can be found at the following references: [GitHub Pull Request](https://github.com/apache/airflow/pull/32014), [Apache Mailing List](https://lists.apache.org/thread/vsflptk5dt30vrfggn96nx87d7zr6yvw), and [NVD CVE Details](https://nvd.nist.gov/vuln/detail/CVE-2023-35908).