Severity: moderate

Affected versions:

- Apache Airflow 2.7.0 before 2.8.0

Description:

Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an 
attacker to trigger a DAG in a GET request without CSRF validation. As a 
result, it was possible for a malicious website opened in the same browser - by 
the user who also had Airflow UI opened - to trigger the execution of DAGs 
without the user's consent.
Users are advised to upgrade to version 2.8.0 or later which is not affected

Credit:

Tareq Ahamed ( 0xt4req) (finder)
Jens Scheffler (remediation developer)

References:

https://github.com/apache/airflow/pull/36026
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-49920


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@airflow.apache.org
For additional commands, e-mail: users-h...@airflow.apache.org

Reply via email to