First published: Thu Aug 17 2023(Updated: )
Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server. It is recommended to upgrade to a version that is not affected.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Apache-airflow-providers-apache-spark | <4.1.3 | |
pip/apache-airflow-providers-apache-spark | <4.1.3 | 4.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40272 is a vulnerability in Apache Airflow Spark Provider that allows an attacker to read arbitrary files on the Airflow server.
CVE-2023-40272 has a severity value of 7.5 (High).
CVE-2023-40272 affects Apache Airflow Spark Provider versions before 4.1.3.
To fix CVE-2023-40272, it is recommended to upgrade to a version of Apache Airflow Spark Provider that is not affected (version 4.1.3 or later).
You can find more information about CVE-2023-40272 at the following references: NVD (https://nvd.nist.gov/vuln/detail/CVE-2023-40272), Apache mailing list (https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7), and GitHub advisory (https://github.com/advisories/GHSA-r2f6-6928-fh8f).