First published: Tue Feb 20 2024(Updated: )
When ssl was enabled for Mongo Hook, default settings included "allow_insecure" which caused that certificates were not validated. This was unexpected and undocumented. Users are recommended to upgrade to version 4.0.0, which fixes this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-airflow-providers-mongo | <4.0.0 | 4.0.0 |
Apache Airflow Providers for MongoDB | >=1.0.0<4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25141 is considered a critical vulnerability due to potential risks associated with insecure SSL configuration.
To fix CVE-2024-25141, upgrade to version 4.0.0 of the apache-airflow-providers-mongo package.
CVE-2024-25141 affects versions of Apache Airflow prior to 4.0.0, particularly with SSL enabled for Mongo Hook.
The implications of CVE-2024-25141 include the possibility of communicating with unverified SSL certificates, which can lead to man-in-the-middle attacks.
CVE-2024-25141 was unexpected and undocumented, highlighting a gap in security for users relying on default SSL settings.