CVE-2023-50783

Apache Airflow, versions before 2.8.0, is affected by a vulnerability that allows an authenticated user without the variable edit permission, to update a variable. This flaw compromises the integrity of variable management, potentially leading to unauthorized data modification. Users are recommended to upgrade to 2.8.0, which fixes this issue
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:37

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/12/21/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2023/12/21/4 - Mailing List, Third Party Advisory
References () https://github.com/apache/airflow/pull/33932 - Patch () https://github.com/apache/airflow/pull/33932 - Patch
References () https://lists.apache.org/thread/rs7cr3yp726mb89s1m844hy9pq7frgcn - Mailing List, Third Party Advisory () https://lists.apache.org/thread/rs7cr3yp726mb89s1m844hy9pq7frgcn - Mailing List, Third Party Advisory

28 Dec 2023, 13:45

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
References () http://www.openwall.com/lists/oss-security/2023/12/21/4 - () http://www.openwall.com/lists/oss-security/2023/12/21/4 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/rs7cr3yp726mb89s1m844hy9pq7frgcn - () https://lists.apache.org/thread/rs7cr3yp726mb89s1m844hy9pq7frgcn - Mailing List, Third Party Advisory
References () https://github.com/apache/airflow/pull/33932 - () https://github.com/apache/airflow/pull/33932 - Patch

21 Dec 2023, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-21 10:15

Updated : 2024-11-21 08:37


NVD link : CVE-2023-50783

Mitre link : CVE-2023-50783

CVE.ORG link : CVE-2023-50783


JSON object : View

Products Affected

apache

  • airflow
CWE
CWE-284

Improper Access Control