{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-47037","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2023-10-30T10:10:48.025Z","datePublished":"2023-11-12T13:12:23.137Z","dateUpdated":"2025-02-13T17:14:45.806Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://pypi.python.org","defaultStatus":"unaffected","packageName":"apache-airflow","product":"Apache Airflow","vendor":"Apache Software Foundation","versions":[{"lessThan":"2.7.3","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"Tareq Ahamed from Hackerone"},{"lang":"en","type":"remediation developer","value":"Augusto Hidalgo"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p><span style=\"background-color: rgb(255, 255, 255);\">We failed to apply&nbsp;CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed then.&nbsp;</span></p><p><span style=\"background-color: rgb(255, 255, 255);\">Apache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.&nbsp;</span></p><p><span style=\"background-color: rgb(255, 255, 255);\">Users should upgrade to version 2.7.3 or later which has removed the vulnerability.</span><br></p><br><br>"}],"value":"We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed then. \n\nApache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. \n\nUsers should upgrade to version 2.7.3 or later which has removed the vulnerability."}],"metrics":[{"other":{"content":{"text":"low"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-863","description":"CWE-863 Incorrect Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2023-11-12T13:15:08.897Z"},"references":[{"tags":["patch"],"url":"https://github.com/apache/airflow/pull/33413"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0"},{"url":"http://www.openwall.com/lists/oss-security/2023/11/12/1"}],"source":{"discovery":"UNKNOWN"},"title":"Apache Airflow missing fix for CVE-2023-40611 in 2.7.1 (DAG run broken access)","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T21:01:22.230Z"},"title":"CVE Program Container","references":[{"tags":["patch","x_transferred"],"url":"https://github.com/apache/airflow/pull/33413"},{"tags":["vendor-advisory","x_transferred"],"url":"https://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0"},{"url":"http://www.openwall.com/lists/oss-security/2023/11/12/1","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-03T15:19:46.132761Z","id":"CVE-2023-47037","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-03T15:23:17.353Z"}}]}}