Users are strongly advised to upgrade to version 2.7.1 or later which has removed the vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0019 | Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated users who have access to see the task/dag in the UI, to craft a URL, which could lead to unmasking the secret configuration of the task that otherwise would be masked in the UI.\n\nUsers are strongly advised to upgrade to version 2.7.1 or later which has removed the vulnerability. |
Github GHSA |
GHSA-mjqh-v5f2-g2mw | Apache Airflow information exposure vulnerability |
Wed, 25 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-25T15:23:45.803Z
Reserved: 2023-08-20T19:29:57.254Z
Link: CVE-2023-40712
Updated: 2024-08-02T18:38:51.164Z
Status : Modified
Published: 2023-09-12T12:15:08.373
Modified: 2024-11-21T08:20:00.877
Link: CVE-2023-40712
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA