Skip to content

Apache Airflow allows authenticated and DAG-view authorized users to modify some DAG run detail values when submitting notes

Moderate severity GitHub Reviewed Published Nov 12, 2023 to the GitHub Advisory Database • Updated Mar 6, 2024

Package

pip apache-airflow (pip)

Affected versions

< 2.7.3

Patched versions

2.7.3

Description

Apache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.  Users should upgrade to version 2.7.3 or later which has removed the vulnerability.

References

Published by the National Vulnerability Database Nov 12, 2023
Published to the GitHub Advisory Database Nov 12, 2023
Reviewed Nov 13, 2023
Last updated Mar 6, 2024

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVE ID

CVE-2023-47037

GHSA ID

GHSA-hm9r-7f84-25c9

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.