Описание
Apache Airflow Improper Input Validation vulnerability
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to cause a service disruption by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-22888
- https://github.com/apache/airflow/pull/32293
- https://github.com/apache/airflow/commit/05bd90f563649f2e9c8f0c85cf5838315a665a02
- https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-105.yaml
- https://lists.apache.org/thread/dnlht2hvm7k81k5tgjtsfmk27c76kq7z
Пакеты
apache-airflow
< 2.6.3
2.6.3
Связанные уязвимости
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to cause a service disruption by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
Apache Airflow, versions before 2.6.3, is affected by a vulnerability ...
Уязвимость программного обеспечения создания, мониторинга и оркестрации сценариев обработки данных Airflow, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании