CVE-2022-46651

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-46651
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-46651.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-46651
Aliases
Published
2023-07-12T10:15:09Z
Modified
2024-10-12T10:19:45.986659Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows an unauthorized actor to gain access to sensitive information in Connection edit view. This vulnerability is considered low since it requires someone with access to Connection resources specifically updating the connection to exploit it. Users should upgrade to version 2.6.3 or later which has removed the vulnerability.

References

Affected packages

Git / github.com/apache/airflow

Affected ranges

Type
GIT
Repo
https://github.com/apache/airflow
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

constraints-2-3

constraints-2.*

constraints-2.0.0rc1
constraints-2.0.0rc2
constraints-2.0.0rc3
constraints-2.0.1rc1
constraints-2.1.0rc1
constraints-2.2.0b1
constraints-2.2.0b2
constraints-2.2.0rc1
constraints-2.3.0b1
constraints-2.3.0rc1
constraints-2.3.0rc2
constraints-2.4.0b1
constraints-2.6.0b1
constraints-2.6.0rc1
constraints-2.6.0rc2
constraints-2.6.0rc3
constraints-2.6.0rc4
constraints-2.6.0rc5
constraints-2.6.1rc1
constraints-2.6.1rc2
constraints-2.6.1rc3
constraints-2.6.2rc1
constraints-2.6.2rc2
constraints-2.6.3rc1