|
Message-ID: <4af9d0e4-e025-9422-b141-48618eb311a9@apache.org> Date: Fri, 04 Aug 2023 15:24:38 +0000 From: Jarek Potiuk <potiuk@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2023-39508: Apache Airflow: Airflow "Run task" feature allows execution with unnecessary priviledges Severity: moderate Affected versions: - Apache Airflow before 2.6.0 Description: Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The "Run Task" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The "Run Task" feature is considered dangerous and it has been removed entirely in Airflow 2.6.0 This issue affects Apache Airflow: before 2.6.0. Credit: balis0ng (finder) References: https://github.com/apache/airflow/pull/29706 https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-39508
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.