CVE-2023-50943
CVSS V2 None
CVSS V3 None
Description
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
Overview
- CVE ID
- CVE-2023-50943
- Assigner
- apache
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-01-24T12:57:07.287Z
- Last Modified Date
- 2024-01-24T12:57:07.287Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/apache/airflow/pull/36255 | patch |
https://lists.apache.org/thread/fx278v0twqzxkcts70tc04cp3f8p56pn | vendor-advisory |
http://www.openwall.com/lists/oss-security/2024/01/24/4 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-50943 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50943 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 18:07:34 | Added to TrackCVE |