First published: Wed Jan 24 2024(Updated: )
Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated user to access the source code of a DAG to which they don't have access. This vulnerability is considered low since it requires an authenticated user to exploit it. Users are recommended to upgrade to version 2.8.1, which fixes this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <2.8.1 | |
pip/apache-airflow | >=0<2.8.1rc1 | 2.8.1rc1 |
<2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50944 is considered a low severity vulnerability since it requires an authenticated user to exploit it.
To mitigate CVE-2023-50944, upgrade Apache Airflow to version 2.8.1 or later.
CVE-2023-50944 affects Apache Airflow versions prior to 2.8.1.
CVE-2023-50944 is a source code exposure vulnerability that allows unauthorized access to DAG source code for authenticated users.
If upgrading is not possible, review user access controls to limit authenticated access to sensitive DAG code.