Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server.
It is recommended to upgrade to a version that is not affected.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/08/17/1 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2023/08/18/1 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7 | Mailing List Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: apache
Published: 2023-08-17T13:52:30.647Z
Updated: 2023-08-17T13:52:30.647Z
Reserved: 2023-08-12T06:29:53.016Z
Link: CVE-2023-40272
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-08-17T14:15:10.083
Modified: 2023-08-24T17:00:07.203
Link: CVE-2023-40272
JSON object: View
Redhat Information
No data.
CWE