CVE-2023-39441:
Apache Airflow missing Certificate Validation
5.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.47329%
CWE
Published
8/23/2023
Updated
3/6/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
apache-airflow-providers-smtp | pip | < 1.3.0 | 1.3.0 |
apache-airflow-providers-imap | pip | < 3.3.0 | 3.3.0 |
apache-airflow | pip | < 2.7.0 | 2.7.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing SSL certificate validation in email client components. The commit diffs show:
- In IMAP hook, the _build_client function previously used IMAP4_SSL without SSL context parameters, defaulting to insecure behavior.
- In SMTP hook, the _build_client similarly lacked SSL context handling for SMTP_SSL connections.
- In Airflow core's email utils, _get_smtp_connection created SMTP_SSL connections without proper context configuration. The patches introduced SSL context selection (default/none) and validation logic to these exact functions, confirming they were the vulnerable points.