Vulnerability identifier: #VU86951
Vulnerability risk: Low
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Apache Airflow
Web applications /
Modules and components for CMS
Vendor: Apache Foundation
Description
The vulnerability allows a remote user to gain access to otherwise restricted functionality.
The vulnerability exists due to application does not properly impose security restrictions. A remote authenticated user can view DAG code and import errors of DAGs they do not have permission to view through the API and the UI.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Apache Airflow: 2.0.0 - 2.8.1
External links
http://github.com/apache/airflow/pull/37290
http://github.com/apache/airflow/pull/37468
http://lists.apache.org/thread/on4f7t5sqr3vfgp1pvkck79wv7mq9st5
http://www.openwall.com/lists/oss-security/2024/02/29/1
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.