Vulnerability Description
Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow. Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend Note: the vulnerability is about the information exposed in the logs not about accessing the logs. This issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3. Users are recommended to upgrade Airflow Celery provider to version 3.4.1 and Apache Airlfow to version 2.7.0 which fixes the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Airflow | >= 1.10.0, < 2.7.0 |
| Apache | Airflow Celery Provider | >= 3.3.0, <= 3.4.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2023/10/28/1Mailing ListThird Party Advisory
- https://github.com/apache/airflow/pull/34954Patch
- https://lists.apache.org/thread/wm1jfmks7r6m7bj0mq4lmw3998svn46nMailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2023/10/28/1Mailing ListThird Party Advisory
- https://github.com/apache/airflow/pull/34954Patch
- https://lists.apache.org/thread/wm1jfmks7r6m7bj0mq4lmw3998svn46nMailing ListVendor Advisory
FAQ
What is CVE-2023-46215?
CVE-2023-46215 is a vulnerability with a CVSS score of 7.5 (HIGH). Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow. Sensitive information logged as clear text when rediss, amqp, rpc protocols are used ...
How severe is CVE-2023-46215?
CVE-2023-46215 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46215?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Airflow, Apache Airflow Celery Provider.