First published: Thu Dec 21 2023(Updated: )
Apache Airflow, versions before 2.8.0, is affected by a vulnerability that allows an authenticated user without the variable edit permission, to update a variable. This flaw compromises the integrity of variable management, potentially leading to unauthorized data modification. Users are recommended to upgrade to 2.8.0, which fixes this issue
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-airflow | <2.8.0 | 2.8.0 |
Apache Airflow | <2.8.0 | |
<2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50783 has a moderate severity level due to its potential for unauthorized data modification.
To fix CVE-2023-50783, upgrade Apache Airflow to version 2.8.0 or later.
CVE-2023-50783 affects all users of Apache Airflow versions before 2.8.0.
CVE-2023-50783 allows unauthorized modification of Airflow variables, which may compromise the integrity of variable management.
CVE-2023-50783 poses a risk to data integrity in your Airflow environment, potentially leading to unauthorized changes by authenticated users.