Insertion of Sensitive Information into Log File Affecting apache-airflow package, versions [2.3.0,2.6.1)
Threat Intelligence
EPSS
0.12% (47th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-APACHEAIRFLOW-6186511
- published 25 Jan 2024
- disclosed 24 Jan 2024
- credit Hussein Awala
Introduced: 24 Jan 2024
CVE-2023-51702 Open this link in a new tabHow to fix?
Upgrade apache-airflow
to version 2.6.1 or higher.
Overview
apache-airflow is a platform to programmatically author, schedule, and monitor workflows.
Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File via the deferrable mode with the path of a Kubernetes configuration file for authentication. An attacker can obtain the configuration file and use it to access the Kubernetes cluster by accessing the metadata or triggerer log, where the configuration dictionary is stored as plain text without masking.
References
CVSS Scores
version 3.1