CVE-2023-40273

Severity
8.0HIGH
EPSS
0.3%
top 50.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 23
Latest updateJan 8

Description

The session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user. Other than manually cleaning the session database (for database session backend), or changing the secure_key and restarting the webserver, there were no mechanisms to force-logout the user (and all other users with that). With this fix implemented, when using the database sessio

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 2.1 | Impact: 5.9

Affected Packages4 packages

🔴Vulnerability Details

5
GHSA
Apache Airflow Fab Provider Insufficient Session Expiration vulnerability2025-01-08
OSV
Apache Airflow Session Fixation vulnerability2023-08-23
CVEList
Session fixation in Apache Airflow web interface2023-08-23
OSV
CVE-2023-40273: The session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been2023-08-23
GHSA
Apache Airflow Session Fixation vulnerability2023-08-23

💬Community

1
HackerOne
CVE-2023-40273: Session fixation in Apache Airflow web interface2023-09-04
CVE-2023-40273 (HIGH CVSS 8) | The session fixation vulnerability | cvebase.io