Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. apache-airflow
  4. ›
  5. CVE-2022-41672

CVE-2022-41672: Apache Airflow may allow authenticated users who have been deactivated to continue using the UI or API

October 7, 2022 (updated September 11, 2024)

In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn’t prevent an already authenticated user from being able to continue using the UI or API.

References

  • github.com/advisories/GHSA-3q8r-f3pj-3gc4
  • github.com/apache/airflow
  • github.com/apache/airflow/commit/12bfb571a895a28a58d3189b0fc10cfc1b89e24c
  • github.com/apache/airflow/pull/26635
  • github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2022-42983.yaml
  • lists.apache.org/thread/ohf3pvd3dftb8zb01yngbn1jtkq5m08y
  • nvd.nist.gov/vuln/detail/CVE-2022-41672

Code Behaviors & Features

Detect and mitigate CVE-2022-41672 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.4.1rc1

Fixed versions

  • 2.4.1rc1

Solution

Upgrade to version 2.4.1rc1 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-285: Improper Authorization
  • CWE-613: Insufficient Session Expiration

Source file

pypi/apache-airflow/CVE-2022-41672.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:46 +0000.