First published: Wed Apr 17 2024(Updated: )
Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your "expose_config" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-airflow | >=2.7.0<2.9.0 | 2.9.0 |
Apache Airflow | >=2.7.0<2.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31869 has been classified as a medium severity vulnerability.
To fix CVE-2024-31869, upgrade your Apache Airflow version to 2.9.0 or later.
CVE-2024-31869 allows an authenticated user to access sensitive provider configuration information through the configuration UI when exposed improperly.
Apache Airflow versions 2.7.0 through 2.8.4 are affected by CVE-2024-31869.
Authenticated users of Apache Airflow who have access to the configuration UI may be impacted by CVE-2024-31869.