Description

A security vulnerability in Apache Airflow, a widely used workflow management platform, could lead to the unintentional exposure of sensitive configuration data, posing a significant risk to system security. Identified as CVE-2024-45784, this flaw has been given a CVSS score of 7.5, categorizing it as a high-severity issue. The vulnerability affects all Airflow versions prior to 2.10.3 and arises from the platform’s failure to automatically mask sensitive configuration data in task logs. As a result, Directed Acyclic Graph (DAG) authors may inadvertently log critical information, such as API keys, database credentials, or other sensitive data. If these logs are accessed by unauthorized individuals, the exposed information could be used to compromise the Airflow deployment. This vulnerability could allow attackers to extract confidential data, including customer records, financial information, or proprietary code. Additionally, leaked credentials could grant unauthorized access to critical systems and infrastructure. Attackers might also exploit these compromised systems to move laterally within the network, potentially gaining access to other sensitive resources.