CVE-2023-46215
Apache Airflow Celery provider, Apache Airflow: Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow.
Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend
Note: the vulnerability is about the information exposed in the logs not about accessing the logs.
This issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3.
Users are recommended to upgrade Airflow Celery provider to version 3.4.1 and Apache Airlfow to version 2.7.0 which fixes the issue.
Vulnerabilidad de inserción de información confidencial en un archivo de registro en el proveedor de Apache Airflow Celery, Apache Airflow. La información confidencial se registra como texto plano cuando los protocolos rediss, amqp y rpc se utilizan como backend de resultados de Celery. Nota: la vulnerabilidad se refiere a la información expuesta en los registros, no al acceso a los registros. Este problema afecta al proveedor Apache Airflow Celery: desde 3.3.0 hasta 3.4.0; Apache Airflow: desde 1.10.0 hasta 2.6.3. Se recomienda a los usuarios actualizar el proveedor Airflow Celery a la versión 3.4.1 y Apache Airlfow a la versión 2.7.0, que soluciona el problema.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-10-18 CVE Reserved
- 2023-10-28 CVE Published
- 2024-09-09 CVE Updated
- 2024-11-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-532: Insertion of Sensitive Information into Log File
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2023/10/28/1 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/apache/airflow/pull/34954 | 2023-11-08 |
URL | Date | SRC |
---|---|---|
https://lists.apache.org/thread/wm1jfmks7r6m7bj0mq4lmw3998svn46n | 2023-11-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Airflow Search vendor "Apache" for product "Airflow" | >= 1.10.0 < 2.7.0 Search vendor "Apache" for product "Airflow" and version " >= 1.10.0 < 2.7.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Airflow Celery Provider Search vendor "Apache" for product "Airflow Celery Provider" | >= 3.3.0 <= 3.4.0 Search vendor "Apache" for product "Airflow Celery Provider" and version " >= 3.3.0 <= 3.4.0" | - |
Affected
|