Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1tamZmLXd2ODUtaG1jas4AAz7T
Apache Airflow vulnerable to exposure of sensitive information
In Apache Airflow, some potentially sensitive values were being shown to the user in certain situations.
This vulnerability is mitigated by the fact configuration is not shown in the UI by default (only if [webserver] expose_config
is set to non-sensitive-only
), and not all uncensored values are actually sentitive.
This issue affects Apache Airflow: from 2.5.0 before 2.6.2. Users are recommended to update to version 2.6.2 or later.
Permalink: https://github.com/advisories/GHSA-mjff-wv85-hmcjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tamZmLXd2ODUtaG1jas4AAz7T
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: 3 days ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-mjff-wv85-hmcj, CVE-2023-35005
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-35005
- https://github.com/apache/airflow/pull/31788
- https://github.com/apache/airflow/pull/31820
- https://lists.apache.org/thread/o4f2cxh0054m9tlxpb81c1yhylor5gjd
- https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-89.yaml
- https://github.com/apache/airflow/commit/5679a01919ac9d5153e858f8b1390cbc7915f148
- https://github.com/apache/airflow/commit/f6cda8fb63250fc4700658999739c1c3c5f6625c
- https://github.com/advisories/GHSA-mjff-wv85-hmcj
Blast Radius: 20.7
Affected Packages
pypi:apache-airflow
Dependent packages: 314Dependent repositories: 1,554
Downloads: 30,839,815 last month
Affected Version Ranges: >= 2.5.0, < 2.6.2rc1
Fixed in: 2.6.2rc1
All affected versions: 2.5.0, 2.5.1, 2.5.2, 2.5.3, 2.6.0, 2.6.1
All unaffected versions: 1.8.1, 1.8.2, 1.9.0, 1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 1.10.5, 1.10.6, 1.10.7, 1.10.8, 1.10.9, 1.10.10, 1.10.11, 1.10.12, 1.10.13, 1.10.14, 1.10.15, 2.0.0, 2.0.1, 2.0.2, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.4.0, 2.4.1, 2.4.2, 2.4.3, 2.6.2, 2.6.3, 2.7.0, 2.7.1, 2.7.2, 2.7.3, 2.8.0, 2.8.1, 2.8.2, 2.8.3, 2.8.4, 2.9.0, 2.9.1, 2.9.2, 2.9.3, 2.10.0, 2.10.1, 2.10.2, 2.10.3