First published: Thu Dec 21 2023(Updated: )
Apache Airflow, in versions prior to 2.8.0, contains a security vulnerability that allows an authenticated user with limited access to some DAGs, to craft a request that could give the user write access to various DAG resources for DAGs that the user had no access to, thus, enabling the user to clear DAGs they shouldn't. This is a missing fix for CVE-2023-42792 in Apache Airflow 2.7.2 Users of Apache Airflow are strongly advised to upgrade to version 2.8.0 or newer to mitigate the risk associated with this vulnerability.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-airflow | <2.8.0 | 2.8.0 |
Apache Airflow | <2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48291 has been classified as a high severity vulnerability due to its potential for unauthorized access to DAG resources.
To fix CVE-2023-48291, upgrade your Apache Airflow installation to version 2.8.0 or later.
CVE-2023-48291 affects all users of Apache Airflow versions prior to 2.8.0.
CVE-2023-48291 allows authenticated users with limited DAG access to gain unauthorized write access to other DAG resources.
Apache Airflow versions prior to 2.8.0 are vulnerable to CVE-2023-48291.