We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed then.
Apache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.
Users should upgrade to version 2.7.3 or later which has removed the vulnerability.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/11/12/1 | Mailing List Third Party Advisory |
https://github.com/apache/airflow/pull/33413 | Issue Tracking Patch |
https://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0 | Mailing List |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: apache
Published: 2023-11-12T13:12:23.137Z
Updated: 2023-11-12T13:12:23.137Z
Reserved: 2023-10-30T10:10:48.025Z
Link: CVE-2023-47037
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-11-12T14:15:25.980
Modified: 2023-11-20T19:31:24.707
Link: CVE-2023-47037
JSON object: View
Redhat Information
No data.
CWE