Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server.
It is recommended to upgrade to a version that is not affected.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/08/17/1 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/08/18/1 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7 | Mailing List Vendor Advisory |
Configurations
History
18 Aug 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Aug 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Aug 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-17 14:15
Updated : 2024-10-01 20:35
NVD link : CVE-2023-40272
Mitre link : CVE-2023-40272
CVE.ORG link : CVE-2023-40272
JSON object : View
Products Affected
apache
- apache-airflow-providers-apache-spark
CWE