Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your "expose_config" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2024-04-18T07:19:05.033Z

Updated: 2024-11-01T18:51:09.881Z

Reserved: 2024-04-06T19:52:15.124Z

Link: CVE-2024-31869

cve-icon Vulnrichment

Updated: 2024-08-02T01:59:50.558Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-18T08:15:38.037

Modified: 2024-11-21T09:14:03.703

Link: CVE-2024-31869

cve-icon Redhat

No data.