Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent.
Users are advised to upgrade to version 2.8.0 or later which is not affected
Users are advised to upgrade to version 2.8.0 or later which is not affected
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T17:18:58.218Z
Reserved: 2023-12-02T15:33:40.610Z
Link: CVE-2023-49920

No data.

Status : Modified
Published: 2023-12-21T10:15:36.330
Modified: 2024-11-21T08:34:00.383
Link: CVE-2023-49920

No data.

No data.