PyPi: Apache-Airflow

CVE-2023-46215

Safety vulnerability ID: 65388

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Oct 28, 2023 Updated at Dec 16, 2024
Scan your Python projects for vulnerabilities →

Advisory

Certain versions of Apache Airflow and its Celery provider are affected by a vulnerability that results in sensitive information being logged in clear text, specifically when using the rediss, amqp, or rpc protocols as the Celery result backend. The security risk pertains to the exposure of this information within log files. Users are advised to implement upgrades that address this vulnerability to mitigate potential security risks.

Affected package

apache-airflow

Latest version: 2.10.4

Programmatically author, schedule and monitor data pipelines

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE