Description
Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server. It is recommended to upgrade to a version that is not affected.
References
http://www.openwall.com/lists/oss-security/2023/08/17/1
Mailing ListThird Party Advisory
http://www.openwall.com/lists/oss-security/2023/08/18/1
Mailing ListThird Party Advisory
https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7
Mailing ListVendor Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2023-08-17T14:15:10.083
1 year agoLast modified
2024-10-01T20:35:06.170
3 weeks ago