Lucene search

K
vulnrichmentApacheVULNRICHMENT:CVE-2024-31869
HistoryApr 18, 2024 - 7:19 a.m.

CVE-2024-31869 Apache Airflow: Sensitive configuration for providers displayed when "non-sensitive-only" config used

2024-04-1807:19:05
CWE-200
apache
github.com
6
apache airflow
sensitive configuration
vulnerability
authenticated user
ui page
workaround
celery provider

AI Score

6.3

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the β€œconfiguration” UI pageΒ when β€œnon-sensitive-only” was set as β€œwebserver.expose_config” configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your β€œexpose_config” configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.

CNA Affected

[
  {
    "vendor": "Apache Software Foundation",
    "product": "Apache Airflow",
    "versions": [
      {
        "status": "affected",
        "version": "2.7.0",
        "versionType": "semver",
        "lessThanOrEqual": "2.8.4"
      }
    ],
    "packageName": "apache-airflow",
    "collectionURL": "https://pypi.python.org",
    "defaultStatus": "unaffected"
  }
]

AI Score

6.3

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial