Insufficient Session Expiration Affecting apache-airflow-providers-fab package, versions [,1.5.2rc1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-APACHEAIRFLOWPROVIDERSFAB-8603622
  • published8 Jan 2025
  • disclosed8 Jan 2025
  • creditSaurabh Banawar

Introduced: 8 Jan 2025

NewCVE-2024-45033  (opens in a new tab)
CWE-613  (opens in a new tab)

How to fix?

Upgrade apache-airflow-providers-fab to version 1.5.2rc1 or higher.

Overview

apache-airflow-providers-fab is a Provider package apache-airflow-providers-fab for Apache Airflow

Affected versions of this package are vulnerable to Insufficient Session Expiration. An authenticated user can continue using an already-logged-in session after the password of the user has been reset via the CLI - up until the expiry of the session of the user.

CVSS Scores

version 4.0
version 3.1