Users of Apache Airflow are advised to upgrade to version 2.7.3 or newer to mitigate the risk associated with this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0026 | Apache Airflow, versions before 2.7.3, has a vulnerability that allows an authorized user who has access to read specific DAGs only, to read information about task instances in other DAGs. This is a different issue than CVE-2023-42663 but leading to similar outcome. Users of Apache Airflow are advised to upgrade to version 2.7.3 or newer to mitigate the risk associated with this vulnerability. |
Github GHSA |
GHSA-r7x6-xfcm-3mxv | Apache Airflow vulnerable to Exposure of Sensitive Information to an Unauthorized Actor |
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T17:09:41.138Z
Reserved: 2023-09-14T07:01:50.218Z
Link: CVE-2023-42781
Updated: 2024-08-02T19:30:24.179Z
Status : Modified
Published: 2023-11-12T14:15:25.847
Modified: 2024-11-21T08:23:08.683
Link: CVE-2023-42781
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA