Vulnerability Details : CVE-2023-42792
Apache Airflow, in versions prior to 2.7.2, contains a security vulnerability that allows an authenticated user with limited access to some DAGs, to craft a request that could give the user write access to various DAG resources for DAGs that the user had no access to, thus, enabling the user to clear DAGs they shouldn't.
Users of Apache Airflow are strongly advised to upgrade to version 2.7.2 or newer to mitigate the risk associated with this vulnerability.
Products affected by CVE-2023-42792
- cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-42792
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-42792
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2023-42792
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by:
- nvd@nist.gov (Primary)
- security@apache.org (Secondary)
References for CVE-2023-42792
-
http://www.openwall.com/lists/oss-security/2023/12/21/1
oss-security - CVE-2023-48291: Apache Airflow: Improper access control to DAG resources
-
https://lists.apache.org/thread/1spbo9nkn49fc2hnxqm9tf6mgqwp9tjq
Apache Mail ArchivesMailing List;Vendor Advisory
-
https://github.com/apache/airflow/pull/34366
Check that dag_ids passed in request are consistent by potiuk · Pull Request #34366 · apache/airflow · GitHubPatch
Jump to