apache-airflow-providers-elasticsearch@6.5.2

Provider package apache-airflow-providers-elasticsearch for Apache Airflow

  • latest version

    6.5.3

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    26 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the apache-airflow-providers-elasticsearch package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Insertion of Sensitive Information into Log File

    apache-airflow-providers-elasticsearch is a Provider package apache-airflow-providers-elasticsearch for Apache Airflow

    Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File due to the _group_logs_by_host function in es_task_handler.py. An attacker can expose embedded Elasticsearch credentials by causing task-log entries to be grouped with the raw [elasticsearch] host URL when a hit lacks a host field. This leaks the user:password@ portion of the configured Elasticsearch endpoint into task-log output, where anyone with task-log read permission can recover the credentials.

    Workarounds

    • Configure Elasticsearch backend credentials via a secret backend instead of embedding user:password@ in the [elasticsearch] host URL; this prevents those credentials from being exposed in task-log output to users with task-log read permission.

    How to fix Insertion of Sensitive Information into Log File?

    Upgrade apache-airflow-providers-elasticsearch to version 6.5.3rc1 or higher.

    [,6.5.3rc1)