Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Apache Airflow Providers OpenSearch: OpenSearch task-log handler leaks credentials embedded in the host URL
Vulnerability Description
The OpenSearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@server.example.com:9200`), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-opensearch` 1.9.1 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[opensearch] host` URL.
CVSS Information
N/A
Vulnerability Type
通过日志文件的信息暴露
Vulnerability Title
Apache Airflow 日志信息泄露漏洞
Vulnerability Description
Apache Airflow是美国阿帕奇(Apache)基金会的一套具有创建、管理和监控工作流程功能的开源平台。该平台具有可扩展和动态监控等特点。 Apache Airflow OpenSearch Provider存在日志信息泄露漏洞,该漏洞源于OpenSearch日志记录提供程序在配置嵌入凭据的host URL时,将完整主机URL写入任务日志,可能导致具有任务日志读取权限的用户获取后端凭据。
CVSS Information
N/A
Vulnerability Type
N/A