Lucene search

K
osvGoogleOSV:BIT-AIRFLOW-2024-31869
HistoryApr 20, 2024 - 7:16 a.m.

BIT-airflow-2024-31869

2024-04-2007:16:43
Google
osv.dev
6
airflow
vulnerability
provider configuration
authentication
ui
community provider
workaround
migration
cve-2023-46288

6.7 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.8%

Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the β€œconfiguration” UI pageΒ when β€œnon-sensitive-only” was set as β€œwebserver.expose_config” configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your β€œexpose_config” configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.

CPENameOperatorVersion
airflowlt2.9.0
airflowge2.7.0

6.7 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.8%

Related for OSV:BIT-AIRFLOW-2024-31869