Loading HuntDB...

CVE-2023-22888

UNKNOWN
Published 2023-07-12T09:17:55.338Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2023-22888. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to cause a service disruption by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

Apache Airflow Improper Input Validation vulnerability

GHSA-5946-8p38-vffp

Advisory Details

Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an attacker to cause a service disruption by manipulating the run_id parameter. This vulnerability is considered low since it requires an authenticated user to exploit it. It is recommended to upgrade to a version that is not affected

Affected Packages

PyPI apache-airflow
ECOSYSTEM: ≥0 <2.6.3

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Advisory provided by GitHub Security Advisory Database. Published: July 12, 2023, Modified: November 18, 2024

References

Published: 2023-07-12T09:17:55.338Z
Last Modified: 2024-10-04T13:48:16.076Z
Copied to clipboard!