[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] =?UTF-8?Q?CVE-2024-31869=3A_Apache_Airflow=3A_Sens?= =?UTF-8?Q?itive_configuration_fo
From: Ephraim Anierobi <ephraimanierobi () apache ! org>
Date: 2024-04-17 22:19:39
Message-ID: 747a6b7c-6cd3-a027-d0db-7235caa2ea11 () apache ! org
[Download RAW message or body]
Severity: low
Affected versions:
- Apache Airflow 2.7.0 through 2.8.4
Description:
Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to \
see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" \
was set as "webserver.expose_config" configuration (The celery provider is the only community \
provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or \
change your "expose_config" configuration to False as a workaround. This is similar, but \
different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned \
API, not UI configuration page.
Credit:
Manmeet Rangoola (finder)
Jarek Potiuk (remediation developer)
References:
https://github.com/apache/airflow/pull/38795
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-31869
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic