We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-45784

Apache Airflow: Sensitive configuration values are not masked in the logs by default



Description

Apache Airflow versions before 2.10.3 contain a vulnerability that could expose sensitive configuration variables in task logs. This vulnerability allows DAG authors to unintentionally or intentionally log sensitive configuration variables. Unauthorized users could access these logs, potentially exposing critical data that could be exploited to compromise the security of the Airflow deployment. In version 2.10.3, secrets are now masked in task logs to prevent sensitive configuration variables from being exposed in the logging output. Users should upgrade to Airflow 2.10.3 or the latest version to eliminate this vulnerability. If you suspect that DAG authors could have logged the secret values to the logs and that your logs are not additionally protected, it is also recommended that you update those secrets.

Reserved 2024-09-08 | Published 2024-11-15 | Updated 2024-11-15 | Assigner apache

Problem types

CWE-1295: Debug Messages Revealing Unnecessary Information

Product status

Default status
unaffected

Any version before 2.10.3
affected

Credits

Saurabh Banawar finder

Amogh Desai remediation developer

References

github.com/apache/airflow/pull/43040 patch

lists.apache.org/thread/k2jm55jztlbmk4zrlh10syvq3n57hl4h vendor-advisory

cve.org (CVE-2024-45784)

nvd.nist.gov (CVE-2024-45784)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-45784

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.