Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
CVE-2023-40273 CVSS:9.8
Apache Airflow could allow a remote authenticated attacker to bypass security restrictions, caused by not invalid user session after password change. By sending a specially crafted request, an attacker could exploit this vulnerability to reuse the user session to gain access to the system.
CVE-2023-39441 CVSS:7.5
Apache Airflow, Airflow SMTP Provider and Airflow IMAP Provider is vulnerable to a man-in-the-middle attack, caused by improper certificate validation. An attacker could exploit this vulnerability to launch a man-in-the-middle attack and gain access to the communication channel between endpoints to obtain mail server credentials or mail contents or further compromise the system.
Apache
Upgrade to the latest version of Apache Airflow, available from the Apache Website.