Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The "Run Task" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The "Run Task" feature is considered dangerous and it has been removed entirely in Airflow 2.6.0
This issue affects Apache Airflow: before 2.6.0.
                
            References
                    | Link | Resource | 
|---|---|
| http://seclists.org/fulldisclosure/2023/Jul/43 | Not Applicable | 
| https://github.com/apache/airflow/pull/29706 | Patch Vendor Advisory | 
| https://lists.apache.org/thread/j2nkjd0zqvtqk85s6ywpx3c35pvzyx15 | Mailing List Vendor Advisory | 
| http://seclists.org/fulldisclosure/2023/Jul/43 | Not Applicable | 
| https://github.com/apache/airflow/pull/29706 | Patch Vendor Advisory | 
| https://lists.apache.org/thread/j2nkjd0zqvtqk85s6ywpx3c35pvzyx15 | Mailing List Vendor Advisory | 
Configurations
                    History
                    13 Feb 2025, 17:16
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) Execution with Unnecessary Privileges, : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Airflow.The "Run Task" feature enables authenticated user to bypass some of the restrictions put in place. It allows to execute code in the webserver context as well as allows to bypas limitation of access the user has to certain DAGs. The "Run Task" feature is considered dangerous and it has been removed entirely in Airflow 2.6.0 This issue affects Apache Airflow: before 2.6.0. | 
21 Nov 2024, 08:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://seclists.org/fulldisclosure/2023/Jul/43 - Not Applicable | |
| References | () https://github.com/apache/airflow/pull/29706 - Patch, Vendor Advisory | |
| References | () https://lists.apache.org/thread/j2nkjd0zqvtqk85s6ywpx3c35pvzyx15 - Mailing List, Vendor Advisory | 
09 Aug 2023, 17:52
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* | |
| First Time | 
        
        Apache airflow
         Apache  | 
|
| References | (MISC) https://lists.apache.org/thread/j2nkjd0zqvtqk85s6ywpx3c35pvzyx15 - Mailing List, Vendor Advisory | |
| References | (MISC) https://github.com/apache/airflow/pull/29706 - Patch, Vendor Advisory | |
| References | (MISC) http://seclists.org/fulldisclosure/2023/Jul/43 - Not Applicable | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 8.8  | 
| CWE | CWE-250  | 
    NVD-CWE-Other | 
05 Aug 2023, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
05 Aug 2023, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-08-05 07:15
Updated : 2025-02-13 17:16
NVD link : CVE-2023-39508
Mitre link : CVE-2023-39508
CVE.ORG link : CVE-2023-39508
JSON object : View
Products Affected
                apache
- airflow
 
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
CWE-250Execution with Unnecessary Privileges
NVD-CWE-Other