Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated users who have access to see the task/dag in the UI, to craft a URL, which could lead to unmasking the secret configuration of the task that otherwise would be masked in the UI.

Users are strongly advised to upgrade to version 2.7.1 or later which has removed the vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-0019 Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated users who have access to see the task/dag in the UI, to craft a URL, which could lead to unmasking the secret configuration of the task that otherwise would be masked in the UI.\n\nUsers are strongly advised to upgrade to version 2.7.1 or later which has removed the vulnerability.
Github GHSA Github GHSA GHSA-mjqh-v5f2-g2mw Apache Airflow information exposure vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 25 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-09-25T15:23:45.803Z

Reserved: 2023-08-20T19:29:57.254Z

Link: CVE-2023-40712

cve-icon Vulnrichment

Updated: 2024-08-02T18:38:51.164Z

cve-icon NVD

Status : Modified

Published: 2023-09-12T12:15:08.373

Modified: 2024-11-21T08:20:00.877

Link: CVE-2023-40712

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.