Описание
Apache Airflow Path Traversal vulnerability
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-22887
- https://github.com/apache/airflow/pull/32293
- https://github.com/apache/airflow/commit/05bd90f563649f2e9c8f0c85cf5838315a665a02
- https://github.com/apache/airflow/commit/8ff7dfbd9e76aa40b04adeb231df3820606f5ba3
- https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-104.yaml
- https://lists.apache.org/thread/rxddqs76r6rkxsg1n24d029zys67qwwo
Пакеты
apache-airflow
< 2.6.3
2.6.3
Связанные уязвимости
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to perform unauthorized file access outside the intended directory structure by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected
Apache Airflow, versions before 2.6.3, is affected by a vulnerability ...
Уязвимость программного обеспечения создания, мониторинга и оркестрации сценариев обработки данных Airflow, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальной информации