CVE-2023-51702Cleartext Storage of Sensitive Info in Software Foundation Apache Airflow

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 80.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 24

Description

Since version 5.2.0, when using deferrable mode with the path of a Kubernetes configuration file for authentication, the Airflow worker serializes this configuration file as a dictionary and sends it to the triggerer by storing it in metadata without any encryption. Additionally, if used with an Airflow version between 2.3.0 and 2.6.0, the configuration dictionary will be logged as plain text in the triggerer service without masking. This allows anyone with access to the metadata or triggerer lo

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

Patches

🔴Vulnerability Details

3
GHSA
Apache Airflow CNCF Kubernetes provider, Apache Airflow: Kubernetes configuration file saved without encryption in the Metadata and logged as plain text in the Triggerer service2024-01-24
CVEList
Apache Airflow CNCF Kubernetes provider, Apache Airflow: Kubernetes configuration file saved without encryption in the Metadata and logged as plain text in the Triggerer service2024-01-24
OSV
Apache Airflow CNCF Kubernetes provider, Apache Airflow: Kubernetes configuration file saved without encryption in the Metadata and logged as plain text in the Triggerer service2024-01-24
CVE-2023-51702 — Cleartext Storage of Sensitive Info | cvebase