diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42781.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42781.json new file mode 100644 index 00000000000..9f6cf6ffbf2 --- /dev/null +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42781.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-42781", + "sourceIdentifier": "security@apache.org", + "published": "2023-11-12T14:15:25.847", + "lastModified": "2023-11-12T14:15:25.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Apache Airflow, versions before 2.7.3, has a vulnerability that allows an authorized user who has access to read specific DAGs only, to read information about task instances in other DAGs.\u00a0 This is a different issue than CVE-2023-42663 but leading to similar outcome.\nUsers of Apache Airflow are advised to upgrade to version 2.7.3 or newer to mitigate the risk associated with this vulnerability." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/airflow/pull/34939", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/7dnl8nszdxqyns57f3dw0sloy5dfl9o1", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47037.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47037.json new file mode 100644 index 00000000000..b60361fda8f --- /dev/null +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47037.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-47037", + "sourceIdentifier": "security@apache.org", + "published": "2023-11-12T14:15:25.980", + "lastModified": "2023-11-12T14:15:25.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "We failed to apply\u00a0CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed then.\u00a0\n\nApache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.\u00a0\n\nUsers should upgrade to version 2.7.3 or later which has removed the vulnerability.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/airflow/pull/33413", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/04y4vrw1t2xl030gswtctc4nt1w90cb0", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d07eac87444..ebe7e1aa67f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-12T13:00:19.138738+00:00 +2023-11-12T15:00:20.927018+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-12T11:15:07.620000+00:00 +2023-11-12T14:15:25.980000+00:00 ``` ### Last Data Feed Release @@ -29,14 +29,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -230351 +230353 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -* [CVE-2023-6084](CVE-2023/CVE-2023-60xx/CVE-2023-6084.json) (`2023-11-12T11:15:07.620`) +* [CVE-2023-42781](CVE-2023/CVE-2023-427xx/CVE-2023-42781.json) (`2023-11-12T14:15:25.847`) +* [CVE-2023-47037](CVE-2023/CVE-2023-470xx/CVE-2023-47037.json) (`2023-11-12T14:15:25.980`) ### CVEs modified in the last Commit