Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server.
It is recommended to upgrade to a version that is not affected.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/08/17/1 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/08/18/1 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7 | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2023/08/17/1 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/08/18/1 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7 | Mailing List Vendor Advisory |
Configurations
History
13 Feb 2025, 17:17
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server. It is recommended to upgrade to a version that is not affected. |
Information
Published : 2023-08-17 14:15
Updated : 2025-02-13 17:17
NVD link : CVE-2023-40272
Mitre link : CVE-2023-40272
CVE.ORG link : CVE-2023-40272
JSON object : View
Products Affected
apache
- apache-airflow-providers-apache-spark
CWE