Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated user to access the source code of a DAG to which they don't have access. This vulnerability is considered low since it requires an authenticated user to exploit it. Users are recommended to upgrade to version 2.8.1, which fixes this issue.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://github.com/apache/airflow/pull/36257 | third party advisory patch |
https://lists.apache.org/thread/92krb5mpcq8qrw4t4j5oooqw7hgd8q7h | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2024/01/24/5 | mailing list |