{"id":"GHSA-6m9r-7wrx-xmr6","summary":"Apache Airflow Cross-Site Request Forgery vulnerability","details":"Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent.\nUsers are advised to upgrade to version 2.8.0 or later which is not affected","aliases":["BIT-airflow-2023-49920","CVE-2023-49920","PYSEC-2023-266"],"modified":"2024-11-21T21:47:19.411982Z","published":"2023-12-21T12:30:28Z","database_specific":{"severity":"MODERATE","github_reviewed":true,"cwe_ids":["CWE-352"],"github_reviewed_at":"2023-12-21T18:13:50Z","nvd_published_at":"2023-12-21T10:15:36Z"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-49920"},{"type":"WEB","url":"https://github.com/apache/airflow/pull/36026"},{"type":"WEB","url":"https://github.com/apache/airflow/commit/f5d802791fa5f6b13b635f06a1ea2eccc22a9ba7"},{"type":"PACKAGE","url":"https://github.com/apache/airflow"},{"type":"WEB","url":"https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-266.yaml"},{"type":"WEB","url":"https://lists.apache.org/thread/mnwd2vcfw3gms6ft6kl951vfbqrxsnjq"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2023/12/21/3"}],"affected":[{"package":{"name":"apache-airflow","ecosystem":"PyPI","purl":"pkg:pypi/apache-airflow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.7.0"},{"fixed":"2.8.0"}]}],"versions":["2.7.0","2.7.1","2.7.1rc1","2.7.1rc2","2.7.2","2.7.2rc1","2.7.3","2.7.3rc1","2.8.0b1","2.8.0rc1","2.8.0rc2","2.8.0rc3","2.8.0rc4"],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-6m9r-7wrx-xmr6/GHSA-6m9r-7wrx-xmr6.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}