CVE-2023-39508: Apache Airflow Execution with Unnecessary Privileges
(updated )
Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The “Run Task” feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The “Run Task” feature is considered dangerous and it has been removed entirely in Airflow 2.6.0.
This issue affects Apache Airflow: before 2.6.0.
References
- github.com/advisories/GHSA-269x-pg5c-5xgm
- github.com/apache/airflow
- github.com/apache/airflow/commit/101d59c4b88ab979d305b8d96f612c27c8a44aa8
- github.com/apache/airflow/pull/29706
- github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-134.yaml
- lists.apache.org/thread/j2nkjd0zqvtqk85s6ywpx3c35pvzyx15
- nvd.nist.gov/vuln/detail/CVE-2023-39508
Detect and mitigate CVE-2023-39508 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →