Vulnerability Details : CVE-2023-35005
In Apache Airflow, some potentially sensitive values were being shown to the user in certain situations.
This vulnerability is mitigated by the fact configuration is not shown in the UI by default (only if `[webserver] expose_config` is set to `non-sensitive-only`), and not all uncensored values are actually sentitive.
This issue affects Apache Airflow: from 2.5.0 before 2.6.2. Users are recommended to update to version 2.6.2 or later.
Vulnerability category: Information leak
Products affected by CVE-2023-35005
- cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-35005
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 26 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-35005
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2023-35005
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security@apache.org (Secondary)
References for CVE-2023-35005
-
https://github.com/apache/airflow/pull/31788
Mark `[secrets] backend_kwargs` as a sensitive config by jedcunningham · Pull Request #31788 · apache/airflow · GitHubPatch
-
https://github.com/apache/airflow/pull/31820
Use single source of truth for sensitive config items by dstandish · Pull Request #31820 · apache/airflow · GitHubIssue Tracking
-
https://lists.apache.org/thread/o4f2cxh0054m9tlxpb81c1yhylor5gjd
CVE-2023-35005: Apache Airflow: Information disclosure on configuration view-Apache Mail ArchivesMailing List;Vendor Advisory
Jump to