Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. apache-airflow-providers-celery
  4. ›
  5. CVE-2023-46215

CVE-2023-46215: Apache Airflow Celery provider Insertion of Sensitive Information into Log File vulnerability

October 28, 2023 (updated February 13, 2025)

Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow.

Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend Note: the vulnerability is about the information exposed in the logs not about accessing the logs.

This issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3.

Users are recommended to upgrade Airflow Celery provider to version 3.4.1 and Apache Airlfow to version 2.7.0 which fixes the issue.

References

  • github.com/advisories/GHSA-666g-rfc5-c9jv
  • github.com/apache/airflow
  • github.com/apache/airflow/pull/34954
  • lists.apache.org/thread/wm1jfmks7r6m7bj0mq4lmw3998svn46n
  • nvd.nist.gov/vuln/detail/CVE-2023-46215

Code Behaviors & Features

Detect and mitigate CVE-2023-46215 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.3.0 before 3.4.1

Fixed versions

  • 3.4.1

Solution

Upgrade to version 3.4.1 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-532: Insertion of Sensitive Information into Log File

Source file

pypi/apache-airflow-providers-celery/CVE-2023-46215.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:57 +0000.