Severity: moderate Affected versions:
- Apache Airflow 2.7.0 before 2.8.0 Description: Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent. Users are advised to upgrade to version 2.8.0 or later which is not affected Credit: Tareq Ahamed ( 0xt4req) (finder) Jens Scheffler (remediation developer) References: https://github.com/apache/airflow/pull/36026 https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-49920 --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@airflow.apache.org For additional commands, e-mail: users-h...@airflow.apache.org