<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2023-49920: Apache Airflow: Missing CSRF protection on DAG/trigger
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Ephraim Anierobi <ephraimanierobi () apache org>
Date: Thu, 21 Dec 2023 07:05:04 +0000
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: moderate
Affected versions:
- Apache Airflow 2.7.0 before 2.8.0
Description:
Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET
request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by
the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent.
Users are advised to upgrade to version 2.8.0 or later which is not affected
Credit:
Tareq Ahamed ( 0xt4req) (finder)
Jens Scheffler (remediation developer)
References:
https://github.com/apache/airflow/pull/36026
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-49920
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2023-49920: Apache Airflow: Missing CSRF protection on DAG/trigger Ephraim Anierobi (Dec 21)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->