{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T06:37:38.905","vulnerabilities":[{"cve":{"id":"CVE-2023-46215","sourceIdentifier":"security@apache.org","published":"2023-10-28T08:15:07.553","lastModified":"2025-06-12T15:15:33.923","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow.\n\nSensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend\nNote: the vulnerability is about the information exposed in the logs not about accessing the logs.\n\nThis issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3.\n\nUsers are recommended to upgrade Airflow Celery provider to version 3.4.1 and Apache Airlfow to version 2.7.0 which fixes the issue."},{"lang":"es","value":"Vulnerabilidad de inserción de información confidencial en un archivo de registro en el proveedor de Apache Airflow Celery, Apache Airflow. La información confidencial se registra como texto plano cuando los protocolos rediss, amqp y rpc se utilizan como backend de resultados de Celery. Nota: la vulnerabilidad se refiere a la información expuesta en los registros, no al acceso a los registros. Este problema afecta al proveedor Apache Airflow Celery: desde 3.3.0 hasta 3.4.0; Apache Airflow: desde 1.10.0 hasta 2.6.3. Se recomienda a los usuarios actualizar el proveedor Airflow Celery a la versión 3.4.1 y Apache Airlfow a la versión 2.7.0, que soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:N\/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-532"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*","versionStartIncluding":"1.10.0","versionEndExcluding":"2.7.0","matchCriteriaId":"1295ECA3-F760-4A73-B48E-6B9B8AB521E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:airflow_celery_provider:*:*:*:*:*:*:*:*","versionStartIncluding":"3.3.0","versionEndIncluding":"3.4.0","matchCriteriaId":"5CD91624-B6CA-4F93-8965-EF7F1D214B70"}]}]}],"references":[{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/28\/1","source":"security@apache.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/github.com\/apache\/airflow\/pull\/34954","source":"security@apache.org","tags":["Patch"]},{"url":"https:\/\/lists.apache.org\/thread\/wm1jfmks7r6m7bj0mq4lmw3998svn46n","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/28\/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/github.com\/apache\/airflow\/pull\/34954","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https:\/\/lists.apache.org\/thread\/wm1jfmks7r6m7bj0mq4lmw3998svn46n","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"]}]}}]}