CVE-2023-46215

Severity CVSS v4.0:
Pending analysis
Type:
CWE-532 Information Exposure Through Log Files
Publication date:
28/10/2023
Last modified:
12/06/2025

Description

Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow.<br /> <br /> Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend<br /> Note: the vulnerability is about the information exposed in the logs not about accessing the logs.<br /> <br /> This issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3.<br /> <br /> Users are recommended to upgrade Airflow Celery provider to version 3.4.1 and Apache Airlfow to version 2.7.0 which fixes the issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:* 1.10.0 (including) 2.7.0 (excluding)
cpe:2.3:a:apache:airflow_celery_provider:*:*:*:*:*:*:*:* 3.3.0 (including) 3.4.0 (including)