Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your "expose_config" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.
CVSS
No CVSS.
References
Configurations
No configuration.
History
21 Nov 2024, 09:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/04/17/10 - | |
References | () https://github.com/apache/airflow/pull/38795 - | |
References | () https://lists.apache.org/thread/pz6vg7wcjk901rmsgt86h76g6kfcgtk3 - |
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Apr 2024, 13:04
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Apr 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-18 08:15
Updated : 2024-11-21 09:14
NVD link : CVE-2024-31869
Mitre link : CVE-2024-31869
CVE.ORG link : CVE-2024-31869
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor