CVE-2023-22887: Apache Airflow Path Traversal vulnerability
(updated )
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
References
- github.com/advisories/GHSA-ggwr-4vr8-g7wv
- github.com/apache/airflow
- github.com/apache/airflow/commit/05bd90f563649f2e9c8f0c85cf5838315a665a02
- github.com/apache/airflow/commit/8ff7dfbd9e76aa40b04adeb231df3820606f5ba3
- github.com/apache/airflow/pull/32293
- github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-104.yaml
- lists.apache.org/thread/rxddqs76r6rkxsg1n24d029zys67qwwo
- nvd.nist.gov/vuln/detail/CVE-2023-22887
Detect and mitigate CVE-2023-22887 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →