First published: Tue Sep 12 2023(Updated: )
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. Users should upgrade to version 2.7.1 or later which has removed the vulnerability.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-airflow | >=0<2.7.1 | 2.7.1 |
Apache Airflow | <2.7.3 | |
Apache Airflow | <2.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40611 is a vulnerability known as Apache Airflow Dag Runs Broken Access Control Vulnerability.
The severity of CVE-2023-40611 is medium with a severity value of 4.3.
CVE-2023-40611 allows authenticated and DAG-view authorized users to modify some DAG run detail values when submitting notes in Apache Airflow.
To fix CVE-2023-40611, users should upgrade to version 2.7.1 of Apache Airflow.
More information about CVE-2023-40611 can be found in the following references: [GitHub Pull Request](https://github.com/apache/airflow/pull/33413), [Apache Mailing List](https://lists.apache.org/thread/8y9xk1s3j4qr36yzqn8ogbn9fl7pxrn0), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-40611)