Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/apache/airflow: CVE-2023-46288 #2805

Closed
GoVulnBot opened this issue May 1, 2024 · 2 comments
Closed
Assignees
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.

Comments

@GoVulnBot
Copy link

CVE-2023-46288 references github.com/apache/airflow, which may be a Go module.

Description:
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Airflow.This issue affects Apache Airflow from 2.4.0 to 2.7.0.

Sensitive configuration information has been exposed to authenticated users with the ability to read configuration via Airflow REST API for configuration even when the expose_config option is set to non-sensitive-only. The expose_config option is False by default. It is recommended to upgrade to a version that is not affected if you set expose_config to non-sensitive-only configuration. This is a different error than CVE-2023-45348 which allows authenticated user to retrieve individual configuration values in 2.7.* by specially crafting their request (solved in 2.7.2).

Users are recommended to upgrade to version 2.7.2, which fixes the issue and additionally fixes CVE-2023-45348.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/apache/airflow
      vulnerable_at: 1.8.2
      packages:
        - package: Apache Airflow
summary: CVE-2023-46288 in github.com/apache/airflow
cves:
    - CVE-2023-46288
references:
    - fix: https://github.com/apache/airflow/pull/32261
    - web: https://lists.apache.org/thread/yw4vzm0c5lqkwm0bxv6qy03yfd1od4nw
    - web: http://www.openwall.com/lists/oss-security/2024/04/17/10
source:
    id: CVE-2023-46288

@tatianab tatianab self-assigned this May 2, 2024
@tatianab tatianab added the excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. label May 3, 2024
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/584376 mentions this issue: data/excluded: batch add 3 excluded reports

@tatianab tatianab added possibly not Go and removed excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. labels May 14, 2024
@tatianab tatianab added excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. and removed possibly not Go labels Jun 5, 2024
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/590855 mentions this issue: data/excluded: add 20 excluded reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.
Projects
None yet
Development

No branches or pull requests

3 participants