CVE-2023-49920

Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent. Users are advised to upgrade to version 2.8.0 or later which is not affected
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:34

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/12/21/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2023/12/21/3 - Mailing List, Third Party Advisory
References () https://github.com/apache/airflow/pull/36026 - Patch () https://github.com/apache/airflow/pull/36026 - Patch
References () https://lists.apache.org/thread/mnwd2vcfw3gms6ft6kl951vfbqrxsnjq - Mailing List, Third Party Advisory () https://lists.apache.org/thread/mnwd2vcfw3gms6ft6kl951vfbqrxsnjq - Mailing List, Third Party Advisory

28 Dec 2023, 13:49

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/12/21/3 - () http://www.openwall.com/lists/oss-security/2023/12/21/3 - Mailing List, Third Party Advisory
References () https://github.com/apache/airflow/pull/36026 - () https://github.com/apache/airflow/pull/36026 - Patch
References () https://lists.apache.org/thread/mnwd2vcfw3gms6ft6kl951vfbqrxsnjq - () https://lists.apache.org/thread/mnwd2vcfw3gms6ft6kl951vfbqrxsnjq - Mailing List, Third Party Advisory
First Time Apache airflow
Apache
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

21 Dec 2023, 15:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2023/12/21/3 -

21 Dec 2023, 13:22

Type Values Removed Values Added
Summary
  • (es) Apache Airflow, desde versión 2.7.0 a 2.7.3, tiene una vulnerabilidad que permite a un atacante activar un DAG en una solicitud GET sin validación CSRF. Como resultado, era posible que un sitio web malicioso abierto en el mismo navegador (por el usuario que también tenía abierta la interfaz de usuario de Airflow) desencadenara la ejecución de DAG sin el consentimiento del usuario. Se recomienda a los usuarios que actualicen a la versión 2.8.0 o posterior, que no se ve afectada.

21 Dec 2023, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-21 10:15

Updated : 2024-11-21 08:34


NVD link : CVE-2023-49920

Mitre link : CVE-2023-49920

CVE.ORG link : CVE-2023-49920


JSON object : View

Products Affected

apache

  • airflow
CWE
CWE-352

Cross-Site Request Forgery (CSRF)