-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| apache-airflow | pip | < 2.6.3 | 2.6.3 |
The vulnerability stems from the way 'dag_id' was retrieved in the authorization decorator. The pre-patch code in 'airflow/www/auth.py' only checked request.args and request.form for 'dag_id', but not the function's kwargs. This allowed attackers to bypass authorization by triggering code paths where 'dag_id' was derived from URL parameters without proper validation. The commit explicitly adds 'kwargs.get("dag_id")' to the extraction logic, and the accompanying test in 'tests/www/views/test_views_tasks.py' confirms the authorization flaw by validating access control with/without DAG permissions. The function's role in authorization checks and the direct patch to this code path confirm its vulnerability.