|
Message-ID: <747a6b7c-6cd3-a027-d0db-7235caa2ea11@apache.org> Date: Wed, 17 Apr 2024 22:19:39 +0000 From: Ephraim Anierobi <ephraimanierobi@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-31869: Apache Airflow: Sensitive configuration for providers displayed when "non-sensitive-only" config used Severity: low Affected versions: - Apache Airflow 2.7.0 through 2.8.4 Description: Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your "expose_config" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page. Credit: Manmeet Rangoola (finder) Jarek Potiuk (remediation developer) References: https://github.com/apache/airflow/pull/38795 https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-31869
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.