Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your "expose_config" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: apache
Published: 2024-04-18T07:19:05.033Z
Updated: 2024-11-01T18:51:09.881Z
Reserved: 2024-04-06T19:52:15.124Z
Link: CVE-2024-31869
Vulnrichment
Updated: 2024-08-02T01:59:50.558Z
NVD
Status : Awaiting Analysis
Published: 2024-04-18T08:15:38.037
Modified: 2024-11-21T09:14:03.703
Link: CVE-2024-31869
Redhat
No data.