{"id":"PYSEC-2023-266","details":"Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent.\nUsers are advised to upgrade to version 2.8.0 or later which is not affected","aliases":["BIT-airflow-2023-49920","CVE-2023-49920","GHSA-6m9r-7wrx-xmr6"],"modified":"2024-11-21T14:59:51.951802Z","published":"2023-12-21T10:15:00Z","references":[{"type":"FIX","url":"https://github.com/apache/airflow/pull/36026"},{"type":"WEB","url":"https://lists.apache.org/thread/mnwd2vcfw3gms6ft6kl951vfbqrxsnjq"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2023/12/21/3"}],"affected":[{"package":{"name":"apache-airflow","ecosystem":"PyPI","purl":"pkg:pypi/apache-airflow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.7.0"},{"fixed":"2.8.0b1"}]}],"versions":["2.7.0","2.7.1","2.7.1rc1","2.7.1rc2","2.7.2","2.7.2rc1","2.7.3","2.7.3rc1"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/apache-airflow/PYSEC-2023-266.yaml"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}