[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2023-34395: Apache Airflow ODBC Provider: Remote code execution vulnerability
From: Elad Kalif <eladkal () apache ! org>
Date: 2023-06-26 15:52:56
Message-ID: 46feeb7c-00af-4cf6-486e-a122519904ec () apache ! org
[Download RAW message or body]
Severity: moderate
Affected versions:
- Apache Airflow ODBC Provider before 4.0.0
Description:
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') \
vulnerability in Apache Software Foundation Apache Airflow ODBC Provider. In OdbcHook, A \
privilege escalation vulnerability exists in a system due to controllable ODBC driver \
parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command \
execution. Starting version 4.0.0 driver can be set only from the hook constructor.
This issue affects Apache Airflow ODBC Provider: before 4.0.0.
Credit:
KmhlYXJ0 (finder)
References:
https://github.com/apache/airflow/pull/31713
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-34395
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic