Severity: low

Affected versions:

- Apache Airflow Fab Provider before 1.5.2

Description:

Insufficient Session Expiration vulnerability in Apache Airflow Fab Provider.

This issue affects Apache Airflow Fab Provider: before 1.5.2.

When user password has been changed with admin CLI, the sessions for that user 
have not been cleared, leading to insufficient session expiration, thus logged 
users could continue to be logged in even after the password was changed. This 
only happened when the password was changed with CLI. The problem does not 
happen in case change was done with webserver thus this is different from  
CVE-2023-40273 https://github.com/advisories/GHSA-pm87-24wq-r8w9  which was 
addressed in Apache-Airflow 2.7.0


Users are recommended to upgrade to version 1.5.2, which fixes the issue.

Credit:

Saurabh Banawar (reporter)

References:

https://github.com/apache/airflow/pull/45139
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-45033

Reply via email to