Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. apache-airflow-providers-fab
  4. ›
  5. CVE-2024-45033

CVE-2024-45033: Apache Airflow Fab Provider Insufficient Session Expiration vulnerability

January 8, 2025

Insufficient Session Expiration vulnerability in Apache Airflow Fab Provider.

This issue affects Apache Airflow Fab Provider: before 1.5.2.

When user password has been changed with admin CLI, the sessions for that user have not been cleared, leading to insufficient session expiration, thus logged users could continue to be logged in even after the password was changed. This only happened when the password was changed with CLI. The problem does not happen in case change was done with webserver thus this is different from CVE-2023-40273 which was addressed in Apache-Airflow 2.7.0

Users are recommended to upgrade to version 1.5.2, which fixes the issue.

References

  • github.com/advisories/GHSA-8863-4qmg-fr45
  • github.com/apache/airflow
  • github.com/apache/airflow/pull/45139
  • lists.apache.org/thread/yw535346rk766ybzpqtvrl36sjj789st
  • nvd.nist.gov/vuln/detail/CVE-2024-45033

Code Behaviors & Features

Detect and mitigate CVE-2024-45033 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.5.2

Fixed versions

  • 1.5.2

Solution

Upgrade to version 1.5.2 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-613: Insufficient Session Expiration

Source file

pypi/apache-airflow-providers-fab/CVE-2024-45033.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:48 +0000.