CVE-2023-42792:
Apache Airflow vulnerable to privilege escalation
6.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
10/14/2023
Updated
9/3/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
apache-airflow | pip | < 2.7.2 | 2.7.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability stems from missing consistency checks for dag_id parameters across multiple request sources. The GitHub PR #34366 explicitly adds a check_dag_consistency function to validate parameter alignment, indicating these were previously missing. The clear endpoint is specifically called out in vulnerability descriptions as an attack vector for unauthorized DAG clearing. Both the validation function and endpoint handler are directly implicated by the patch and CVE description.