First published: Fri Aug 04 2023(Updated: )
Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The "Run Task" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The "Run Task" feature is considered dangerous and it has been removed entirely in Airflow 2.6.0 This issue affects Apache Airflow: before 2.6.0.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <2.6.0 | |
pip/apache-airflow | <2.6.0b1 | 2.6.0b1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39508 is a vulnerability in Apache Airflow that allows execution with unnecessary privileges and exposes sensitive information to unauthorized actors.
CVE-2022-9626 has a high severity level with a CVSS score of 8.8.
CVE-2023-39508 affects Apache Airflow by enabling authenticated users to bypass some restrictions and execute code in the webserver.
To fix CVE-2023-39508, upgrade your Apache Airflow to version 2.6.0 or higher.
You can find more information about CVE-2023-39508 in the following references: [link1](https://github.com/apache/airflow/pull/29706), [link2](https://lists.apache.org/thread/j2nkjd0zqvtqk85s6ywpx3c35pvzyx15), [link3](http://seclists.org/fulldisclosure/2023/Jul/43).