|
Message-ID: <6eff6ca4-f60c-7624-562b-6d4835eb7f0d@apache.org> Date: Tue, 11 Jul 2023 15:20:28 +0000 From: Ephraim Anierobi <ephraimanierobi@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2023-36543: Apache Airflow: ReDoS via dags function Severity: low Affected versions: - Apache Airflow before 2.6.3 Description: Apache Airflow, versions before 2.6.3, has a vulnerability where an authenticated user can use crafted input to make the current request hang. It is recommended to upgrade to a version that is not affected Credit: National Cyber Security VietNam (NCS VietNam) (finder) hungtd (finder) References: https://github.com/apache/airflow/pull/32060 https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-36543
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.