Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <997fb0a3-e9b6-7b55-00db-af69f1017420@apache.org>
Date: Fri, 01 Mar 2024 10:30:43 +0000
From: Ephraim Anierobi <ephraimanierobi@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-26280: Apache Airflow: Overly broad default permissions
 for Viewer/Ops (audit logs) 

Severity: low

Affected versions:

- Apache Airflow before 2.8.2

Description:

Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops and Viewers users to view all information on audit logs, including dag names and usernames they were not permitted to view. With 2.8.2 and newer, Ops and Viewer users do not have audit log permission by default, they need to be explicitly granted permissions to see the logs. Only admin users have audit log permission by default.

Users of Apache Airflow are recommended to upgrade to version 2.8.2 or newer to mitigate the risk associated with this vulnerability

Credit:

Yusuf AYDIN (@h1_yusuf) (finder)

References:

https://github.com/apache/airflow/pull/37501
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-26280

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.