CVE-2024-45033

HIGH

Apache Airflow Fab Provider <1.5.2 - Info Disclosure

Title source: llm
STIX 2.1

Description

Insufficient Session Expiration vulnerability in Apache Airflow Fab Provider. This issue affects Apache Airflow Fab Provider: before 1.5.2. When user password has been changed with admin CLI, the sessions for that user have not been cleared, leading to insufficient session expiration, thus logged users could continue to be logged in even after the password was changed. This only happened when the password was changed with CLI. The problem does not happen in case change was done with webserver thus this is different from  CVE-2023-40273 https://github.com/advisories/GHSA-pm87-24wq-r8w9  which was addressed in Apache-Airflow 2.7.0 Users are recommended to upgrade to version 1.5.2, which fixes the issue.

Scores

CVSS v3 8.1
EPSS 0.0100
EPSS Percentile 77.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-613
Status published
Products (2)
apache/apache-airflow-providers-fab < 1.5.2
pypi/apache-airflow-providers-fab 0 - 1.5.2PyPI
Published Jan 08, 2025
Tracked Since Feb 18, 2026