Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent.
Users are advised to upgrade to version 2.8.0 or later which is not affected
Users are advised to upgrade to version 2.8.0 or later which is not affected
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6m9r-7wrx-xmr6 | Apache Airflow Cross-Site Request Forgery vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T17:18:58.218Z
Reserved: 2023-12-02T15:33:40.610Z
Link: CVE-2023-49920
No data.
Status : Modified
Published: 2023-12-21T10:15:36.330
Modified: 2024-11-21T08:34:00.383
Link: CVE-2023-49920
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA