First published: Wed Jul 12 2023(Updated: )
Apache Airflow, versions before 2.6.3, has a vulnerability where an authenticated user can use crafted input to make the current request hang. It is recommended to upgrade to a version that is not affected
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <2.6.3 | |
pip/apache-airflow | <2.6.3 | 2.6.3 |
<2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36543 is a vulnerability in Apache Airflow versions before 2.6.3 where an authenticated user can use crafted input to make the current request hang.
The severity of CVE-2023-36543 is medium with a CVSS v3 score of 6.5 out of 10.
To fix CVE-2023-36543, it is recommended to upgrade to Apache Airflow version 2.6.3 or above.
You can find more information about CVE-2023-36543 on the Apache Airflow GitHub page, the Apache mailing list, and the NIST NVD website.
The Common Weakness Enumerations (CWEs) associated with CVE-2023-36543 are CWE-1333 (Improper Handling of Highly Compressed Data) and CWE-20 (Improper Input Validation).