Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14dnc5LTNtaG0teGpxcc4AA0pJ
Apache Airflow information disclosure vulnerability
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an unauthorized actor to gain access to sensitive information in Connection edit view. This vulnerability is considered low since it requires someone with access to Connection resources specifically updating the connection to exploit it. Users should upgrade to version 2.6.3 or later which has removed the vulnerability.
Permalink: https://github.com/advisories/GHSA-xvw9-3mhm-xjqqJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14dnc5LTNtaG0teGpxcc4AA0pJ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 5 months ago
Updated: 22 days ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-xvw9-3mhm-xjqq, CVE-2022-46651
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-46651
- https://github.com/apache/airflow/pull/32309
- https://lists.apache.org/thread/n45h3y82og125rnlgt6rbm9szfb6q24d
- https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-103.yaml
- https://github.com/apache/airflow/commit/d01248382fe45a5f5a7fdeed4082a80c5f814ad8
- https://github.com/advisories/GHSA-xvw9-3mhm-xjqq
Affected Packages
pypi:apache-airflow
Versions: < 2.6.3Fixed in: 2.6.3