{"vulnerability": "CVE-2023-50943", "sightings": [{"uuid": "3558bab9-a3c7-45c8-bcb7-bb2a09b0f465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50943", "type": "seen", "source": "https://t.me/arpsyndicate/3115", "content": "#ExploitObserverAlert\n\nCVE-2023-50943\n\nDESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2023-50943. Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of \"enable_xcom_pickling=False\" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.", "creation_timestamp": "2024-01-26T23:31:34.000000Z"}, {"uuid": "6f1d3833-39fe-4df0-8911-f10c1bf4dbad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50943", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4335", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-50943\n\ud83d\udd25 CVSS Score: 7.5 (CVSS_V3)\n\ud83d\udd39 Description: Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of \"enable_xcom_pickling=False\" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.\n\ud83d\udccf Published: 2024-01-24T15:30:30Z\n\ud83d\udccf Modified: 2025-02-13T19:33:15Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2023-50943\n2. https://github.com/apache/airflow/pull/36255\n3. https://github.com/apache/airflow/commit/2c4c5bc604e9ab0cc1e98f7bee7d31d566579462\n4. https://github.com/apache/airflow\n5. https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2024-13.yaml\n6. https://lists.apache.org/thread/fx278v0twqzxkcts70tc04cp3f8p56pn\n7. http://www.openwall.com/lists/oss-security/2024/01/24/4", "creation_timestamp": "2025-02-13T20:13:02.000000Z"}, {"uuid": "6e359c6a-3afb-4fa6-96ba-d57be997b7f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50943", "type": "seen", "source": "https://t.me/ctinow/187059", "content": "https://ift.tt/uTB4gpN\nCVE-2023-50943 | Apache Airflow up to 2.8.0 Xcom Data deserialization", "creation_timestamp": "2024-02-17T22:26:34.000000Z"}, {"uuid": "561a7a0b-7c7b-4195-a1ac-64f4e2aa6fbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50943", "type": "seen", "source": "https://t.me/ctinow/172780", "content": "https://ift.tt/heYJ3Ug\nCVE-2023-50943", "creation_timestamp": "2024-01-24T14:26:47.000000Z"}]}