[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2022-40954: Apache Airflow Spark Provider, Apache Airflow: Airflow 2.3.4 spark pr
From:       Jarek Potiuk <potiuk () apache ! org>
Date:       2022-11-21 20:41:11
Message-ID: f62db289-55b5-0163-ab99-783c23f2185b () apache ! org
[Download RAW message or body]

Description:

Improper Neutralization of Special Elements used in an OS Command ('OS =
Command Injection') vulnerability in Apache Airflow Spark Provider, Apache =
Airflow allows an attacker to read arbtrary files in the task execution =
context, without write access to DAG files. This issue affects Spark =
Provider versions prior to 4.0.0. It also impacts any Apache Airflow =
versions prior to 2.3.0 in case Spark Provider is installed (Spark Provider=
 4.0.0 can only be installed for Airflow 2.3.0+). Note that you need to =
manually install the Spark Provider version 4.0.0 in order to get rid of =
the vulnerability on top of Airflow 2.3.0+ version that has lower version =
of the Spark Provider installed).

Credit:

Apache Airflow PMC wants to thank id_No2015429 of 3H Security Team for =
reporting the issue.

References:

https://github.com/apache/airflow/pull/27646

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic