中危 Apache Airflow 代码问题漏洞(CVE-2023-37379)
CVE编号
CVE-2023-37379利用情况
暂无补丁情况
官方补丁披露时间
2023-08-24漏洞描述
Apache Airflow, in versions prior to 2.7.0, contains a security vulnerability that can be exploited by an authenticated user possessing Connection edit privileges. This vulnerability allows the user to access connection information and exploit the test connection feature by sending many requests, leading to a denial of service (DoS) condition on the server. Furthermore, malicious actors can leverage this vulnerability to establish harmful connections with the server. Users of Apache Airflow are strongly advised to upgrade to version 2.7.0 or newer to mitigate the risk associated with this vulnerability. Additionally, administrators are encouraged to review and adjust user permissions to restrict access to sensitive functionalities, reducing the attack surface.解决建议
"将组件 apache-airflow 升级至 2.7.0 及以上版本"
参考链接 |
|
---|---|
http://www.openwall.com/lists/oss-security/2023/08/23/4 | |
https://github.com/apache/airflow/pull/32052 | |
https://lists.apache.org/thread/g5c9vcn27lr14go48thrjpo6f4vw571r |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | airflow | * | Up to (excluding) 2.7.0 |
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-200 | 信息暴露 |
CWE-400 | 未加控制的资源消耗(资源穷尽) |
CWE-918 | 服务端请求伪造(SSRF) |
NVD-CWE-noinfo |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论