CVE-2023-40272
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
17/08/2023
Last modified:
13/02/2025
Description
Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server.<br />
It is recommended to upgrade to a version that is not affected.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:*:*:*:*:*:*:*:* | 4.1.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2023/08/17/1
- http://www.openwall.com/lists/oss-security/2023/08/18/1
- https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7
- http://www.openwall.com/lists/oss-security/2023/08/17/1
- http://www.openwall.com/lists/oss-security/2023/08/18/1
- https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7