中危 Apache Airflow 代码问题漏洞(CVE-2023-37379)

CVE编号

CVE-2023-37379

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-08-24
漏洞描述
Apache Airflow, in versions prior to 2.7.0, contains a security vulnerability that can be exploited by an authenticated user possessing Connection edit privileges. This vulnerability allows the user to access connection information and exploit the test connection feature by sending many requests, leading to a denial of service (DoS) condition on the server. Furthermore, malicious actors can leverage this vulnerability to establish harmful connections with the server.

Users of Apache Airflow are strongly advised to upgrade to version 2.7.0 or newer to mitigate the risk associated with this vulnerability. Additionally, administrators are encouraged to review and adjust user permissions to restrict access to sensitive functionalities, reducing the attack surface.


解决建议
"将组件 apache-airflow 升级至 2.7.0 及以上版本"
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 apache airflow * Up to
(excluding)
2.7.0
阿里云评分
5.9
  • 攻击路径
    远程
  • 攻击复杂度
    复杂
  • 权限要求
    普通权限
  • 影响范围
    全局影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-200 信息暴露
CWE-400 未加控制的资源消耗(资源穷尽)
CWE-918 服务端请求伪造(SSRF)
NVD-CWE-noinfo
阿里云安全产品覆盖情况