|
|
Message-ID: <bd6d78f8-5458-d3f0-9fe1-806b534dcf93@apache.org> Date: Thu, 15 Jan 2026 20:23:55 +0000 From: Ephraim Anierobi <ephraimanierobi@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-68675: Apache Airflow: proxy credentials for various providers might leak in task logs Severity: low Affected versions: - Apache Airflow (apache-airflow) before 3.1.6 Description: In Apache Airflow versions before 3.1.6, the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later, which fixes this issue Credit: lwlkr https://github.com/kwkr (finder) Ankit Chaurasia (remediation developer) References: https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2025-68675
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.