Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated users who have access to see the task/dag in the UI, to craft a URL, which could lead to unmasking the secret configuration of the task that otherwise would be masked in the UI.
Users are strongly advised to upgrade to version 2.7.1 or later which has removed the vulnerability.
References
Link | Resource |
---|---|
https://github.com/apache/airflow/pull/33512 | Vendor Advisory |
https://github.com/apache/airflow/pull/33516 | Vendor Advisory |
https://lists.apache.org/thread/jw1yv4lt6hpowqbb0x4o3tdp0jhx2bts | Mailing List Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-09-12 12:15
Updated : 2023-09-13 03:50
NVD link : CVE-2023-40712
Mitre link : CVE-2023-40712
CVE.ORG link : CVE-2023-40712
JSON object : View
Products Affected
apache
- airflow
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor