CVE-2023-47037:
Apache Airflow allows authenticated and DAG-view authorized users to modify some DAG run detail values when submitting notes
4.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
11/12/2023
Updated
2/13/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
apache-airflow | pip | < 2.7.3 | 2.7.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper authorization in form handling. The key evidence is in the patch which:
- Added ReadOnly validators to sensitive fields
- Modified populate_obj methods to only process non-read-only fields
- Explicitly states in commit message: 'override the form's populate_obj method so field.populate_obj is not called for read-only fields'
The original populate_obj implementations allowed processing of all form fields regardless of read-only status, enabling unauthorized modifications via form submissions.