Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow. Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend Note: the vulnerability is about the information exposed in the logs not about accessing the logs. This issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3. Users are recommended to upgrade Airflow Celery provider to version 3.4.1 and Apache Airlfow to version 2.7.0 which fixes the issue.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2023-10-28T07:10:57.943Z

Updated: 2024-09-09T14:34:05.718Z

Reserved: 2023-10-18T22:05:37.824Z

Link: CVE-2023-46215

cve-icon Vulnrichment

Updated: 2024-08-02T20:37:40.115Z

cve-icon NVD

Status : Analyzed

Published: 2023-10-28T08:15:07.553

Modified: 2023-11-08T00:45:55.787

Link: CVE-2023-46215

cve-icon Redhat

No data.