mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
68 lines
3.0 KiB
JSON
68 lines
3.0 KiB
JSON
{
|
|
"id": "CVE-2024-50378",
|
|
"sourceIdentifier": "security@apache.org",
|
|
"published": "2024-11-08T15:15:06.143",
|
|
"lastModified": "2024-11-21T09:44:35.040",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Airflow versions before 2.10.3 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see.\u00a0When sensitive variables were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.10.3 or a later version, which addresses this issue. Users who previously used the CLI to set secret variables should manually delete entries with those variables from the log table."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Las versiones de Airflow anteriores a la 2.10.3 tienen una vulnerabilidad que permite a los usuarios autenticados con acceso al registro de auditor\u00eda ver valores confidenciales en los registros de auditor\u00eda que no deber\u00edan ver. Cuando se configuraban variables confidenciales a trav\u00e9s de la CLI de Airflow, los valores de esas variables aparec\u00edan en el registro de auditor\u00eda y se almacenaban sin cifrar en la base de datos de Airflow. Si bien este riesgo se limita a los usuarios con acceso al registro de auditor\u00eda, se recomienda actualizar a Airflow 2.10.3 o una versi\u00f3n posterior, que solucione este problema. Los usuarios que anteriormente utilizaban la CLI para configurar variables secretas deben eliminar manualmente las entradas con esas variables de la tabla de registro."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
|
"baseScore": 4.9,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@apache.org",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-201"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/apache/airflow/pull/43123",
|
|
"source": "security@apache.org"
|
|
},
|
|
{
|
|
"url": "https://lists.apache.org/thread/17rxys384lzfd6nhm3fztzgvk47zy7jb",
|
|
"source": "security@apache.org"
|
|
},
|
|
{
|
|
"url": "http://www.openwall.com/lists/oss-security/2024/11/08/5",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |