7.5
CVSSv3

CVE-2023-50943

Published: 24/01/2024 Updated: 30/01/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Apache Airflow, versions prior to 2.8.1, have a vulnerability that allows a potential malicious user to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.

Vulnerable Product Search on Vulmon Subscribe to Product

apache airflow

Mailing Lists

Severity: low Affected versions: - Apache Airflow before 281 Description: Apache Airflow, versions before 281, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization This vulnerabi ...