Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent.
Users are advised to upgrade to version 2.8.0 or later which is not affected
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/12/21/3 | Mailing List Third Party Advisory |
https://github.com/apache/airflow/pull/36026 | Patch |
https://lists.apache.org/thread/mnwd2vcfw3gms6ft6kl951vfbqrxsnjq | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-12-21 10:15
Updated : 2023-12-28 13:49
NVD link : CVE-2023-49920
Mitre link : CVE-2023-49920
CVE.ORG link : CVE-2023-49920
JSON object : View
Products Affected
apache
- airflow
CWE
CWE-352
Cross-Site Request Forgery (CSRF)