Vulnerability Description
We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed then. Apache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. Users should upgrade to version 2.7.3 or later which has removed the vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Airflow | < 2.7.3 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2023/11/12/1Mailing ListThird Party Advisory
- https://github.com/apache/airflow/pull/33413Issue TrackingPatch
- https://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0Mailing List
- http://www.openwall.com/lists/oss-security/2023/11/12/1Mailing ListThird Party Advisory
- https://github.com/apache/airflow/pull/33413Issue TrackingPatch
- https://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0Mailing List
FAQ
What is CVE-2023-47037?
CVE-2023-47037 is a vulnerability with a CVSS score of 4.3 (MEDIUM). We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed then. Apache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-vi...
How severe is CVE-2023-47037?
CVE-2023-47037 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-47037?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Airflow.