<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2024-31869: Apache Airflow: Sensitive configuration for providers displayed when "non-sensitive-only" config used
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Ephraim Anierobi <ephraimanierobi () apache org>
Date: Wed, 17 Apr 2024 22:19:39 +0000
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: low
Affected versions:
- Apache Airflow 2.7.0 through 2.8.4
Description:
Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider
configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config"
configuration (The celery provider is the only community provider currently that has sensitive configurations). You
should migrate to Airflow 2.9 or change your "expose_config" configuration to False as a workaround. This is similar,
but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI
configuration page.
Credit:
Manmeet Rangoola (finder)
Jarek Potiuk (remediation developer)
References:
https://github.com/apache/airflow/pull/38795
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-31869
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2024-31869: Apache Airflow: Sensitive configuration for providers displayed when "non-sensitive-only" config used Ephraim Anierobi (Apr 17)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->