Lucene search

K
githubGitHub Advisory DatabaseGHSA-666G-RFC5-C9JV
HistoryOct 28, 2023 - 9:30 a.m.

Apache Airflow Celery provider Insertion of Sensitive Information into Log File vulnerability

2023-10-2809:30:44
CWE-532
GitHub Advisory Database
github.com
18
apache airflow
celery provider
log file
sensitive information
vulnerability
rediss
amqp
rpc protocols
upgrade
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0.005

Percentile

77.5%

Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow.

Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend
Note: theย vulnerability is about the information exposed in the logs not about accessing the logs.

This issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3.

Users are recommended to upgrade Airflow Celery provider to version 3.4.1ย and Apache Airlfow to version 2.7.0 which fixes the issue.

Affected configurations

Vulners
Node
apacheairflowRange1.10.0โ€“2.7.0
OR
apacheairflow_celery_providerRange3.3.0โ€“3.4.1
VendorProductVersionCPE
apacheairflow*cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
apacheairflow_celery_provider*cpe:2.3:a:apache:airflow_celery_provider:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.8

Confidence

High

EPSS

0.005

Percentile

77.5%