First published: Fri Aug 25 2023(Updated: )
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider. When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users. To view the warning in the docs please visit https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Airflow Spark Provider | <4.1.3 | |
pip/apache-airflow-providers-apache-spark | <4.1.3 | 4.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40195 is a deserialization vulnerability in Apache Airflow Spark Provider that allows for remote code execution (RCE).
CVE-2023-40195 has a severity rating of 8.8 (high).
Apache Airflow Spark Provider version up to 4.1.3 is affected by CVE-2023-40195.
CVE-2023-40195 exploits the deserialization of untrusted data in Apache Airflow Spark Provider, allowing an attacker to execute arbitrary code.
Yes, updating to a version of Apache Airflow Spark Provider above 4.1.3 will fix CVE-2023-40195.