|
|
Message-ID: <70e68108-a8b7-d0ea-8735-f6c2f7ae0aca@apache.org> Date: Tue, 19 May 2026 18:06:00 +0000 From: Vincent Beck <vincbeck@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-27173: Apache Airflow CNCF Kubernetes provider: JWT Token Exposure in KubernetesExecutor Command-Line Arguments Severity: Moderate Affected versions: - Apache Airflow CNCF Kubernetes provider (apache-airflow-providers-cncf-kubernetes) before 10.17.0 Description: JWT tokens that were used by workers in Kubernetes Executors have been exposed to users who had read only access to Kuberentes Pods. This could allow users with just read-only access to perform actions that were only available to running tasks via Task SDK and potentially allow to modify state of Airflow Database for tasks. Credit: Nikolai Dvoinishnikov, Welltory (finder) Anton Kuznetsov, Welltory (finder) Anish Giri (remediation developer) References: https://github.com/apache/airflow/pull/60108 https://airflow.apache.org/ https://www.cve.org/CVERecord?id=CVE-2026-27173
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.