Safety vulnerability ID: 71726
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow. Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend Note: the vulnerability is about the information exposed in the logs not about accessing the logs
Latest version: 3.9.0
Provider package apache-airflow-providers-celery for Apache Airflow
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application