First published: Wed Jul 12 2023(Updated: )
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an unauthorized actor to gain access to sensitive information in Connection edit view. This vulnerability is considered low since it requires someone with access to Connection resources specifically updating the connection to exploit it. Users should upgrade to version 2.6.3 or later which has removed the vulnerability.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow | <2.6.3 | |
pip/apache-airflow | <2.6.3 | 2.6.3 |
<2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46651 is a vulnerability in Apache Airflow versions before 2.6.3 that allows an unauthorized actor to gain access to sensitive information in the Connection edit view.
CVE-2022-46651 has a severity rating of 6.5 (medium).
CVE-2022-46651 affects Apache Airflow versions before 2.6.3 by exposing sensitive information in the Connection edit view.
To fix CVE-2022-46651, update your Apache Airflow installation to version 2.6.3 or higher.
You can find more information about CVE-2022-46651 on the following references: [GitHub](https://github.com/apache/airflow/pull/32309), [Apache Mailing List](https://lists.apache.org/thread/n45h3y82og125rnlgt6rbm9szfb6q24d), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-46651).