CVE-2023-22888: Apache Airflow Improper Input Validation vulnerability
(updated )
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to cause a service disruption by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
References
- github.com/advisories/GHSA-5946-8p38-vffp
- github.com/apache/airflow
- github.com/apache/airflow/commit/05bd90f563649f2e9c8f0c85cf5838315a665a02
- github.com/apache/airflow/pull/32293
- github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-105.yaml
- lists.apache.org/thread/dnlht2hvm7k81k5tgjtsfmk27c76kq7z
- nvd.nist.gov/vuln/detail/CVE-2023-22888
Detect and mitigate CVE-2023-22888 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →