Skip to content

Apache Airflow: Sensitive configuration for providers displayed when "non-sensitive-only" config used

Moderate severity GitHub Reviewed Published Apr 18, 2024 to the GitHub Advisory Database • Updated May 2, 2024

Package

pip apache-airflow (pip)

Affected versions

>= 2.7.0, < 2.9.0

Patched versions

2.9.0

Description

Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your "expose_config" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.

References

Published by the National Vulnerability Database Apr 18, 2024
Published to the GitHub Advisory Database Apr 18, 2024
Reviewed Apr 18, 2024
Last updated May 2, 2024

Severity

Moderate

EPSS score

0.045%
(17th percentile)

Weaknesses

CVE ID

CVE-2024-31869

GHSA ID

GHSA-2522-mrjc-m688

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.