Safety vulnerability ID: 65388
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Certain versions of Apache Airflow and its Celery provider are affected by a vulnerability that results in sensitive information being logged in clear text, specifically when using the rediss, amqp, or rpc protocols as the Celery result backend. The security risk pertains to the exposure of this information within log files. Users are advised to implement upgrades that address this vulnerability to mitigate potential security risks.
Latest version: 2.10.4
Programmatically author, schedule and monitor data pipelines
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application