|
|
Message-ID: <b8a7d907-763d-9543-6dae-881175a71929@apache.org> Date: Sun, 10 May 2026 19:28:36 +0000 From: Shahar Epstein <shahar@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-43826: Apache Airflow Providers OpenSearch: OpenSearch task-log handler leaks credentials embedded in the host URL Severity: low Affected versions: - Apache Airflow Providers OpenSearch (apache-airflow-providers-opensearch) before 1.9.1 Description: The OpenSearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@...ver.example.com:9200`), wrote the full host URL — including the embedded credentials — into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-opensearch` 1.9.1 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[opensearch] host` URL. Credit: Aleksandr Sozinov (finder) Owen-CH-Leung (finder) Jarek Potiuk (remediation developer) References: https://github.com/apache/airflow/pull/65509 https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2026-43826
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.