CVE-2023-40712: Apache Airflow information exposure vulnerability
(updated )
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated users who have access to see the task/dag in the UI, to craft a URL, which could lead to unmasking the secret configuration of the task that otherwise would be masked in the UI.
Users are strongly advised to upgrade to version 2.7.1 or later which has removed the vulnerability.
References
- github.com/advisories/GHSA-mjqh-v5f2-g2mw
- github.com/apache/airflow
- github.com/apache/airflow/commit/4390524a41fdfd2d57f1d2dc98ad7b4009c8399e
- github.com/apache/airflow/commit/d9814eb3a2fc1dbbb885a0a2c1b7a23ce1cfa148
- github.com/apache/airflow/pull/33512
- github.com/apache/airflow/pull/33516
- github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2023-171.yaml
- lists.apache.org/thread/jw1yv4lt6hpowqbb0x4o3tdp0jhx2bts
- nvd.nist.gov/vuln/detail/CVE-2023-40712
Detect and mitigate CVE-2023-40712 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →