First published: Sun Nov 12 2023(Updated: )
Apache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. Users should upgrade to version 2.7.3 or later which has removed the vulnerability.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <2.7.3 | |
pip/apache-airflow | <2.7.3 | 2.7.3 |
<2.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47037 is a vulnerability in Apache Airflow that allows authenticated users to modify some DAG run detail values when submitting notes.
CVE-2023-47037 affects Apache Airflow versions before 2.7.3, allowing authenticated users to modify certain DAG run detail values.
CVE-2023-47037 is considered a medium severity vulnerability with a CVSS score of 4.3.
To fix CVE-2023-47037, upgrade to Apache Airflow version 2.7.3 or later.
You can find more information about CVE-2023-47037 at the following references: [Openwall](http://www.openwall.com/lists/oss-security/2023/11/12/1), [GitHub](https://github.com/apache/airflow/pull/33413), [Apache Mailing List](https://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0).