Just to add severity: moderate.

On Mon, Nov 21, 2022 at 9:41 PM Jarek Potiuk <pot...@apache.org> wrote:
>
> Description:
>
> Improper Neutralization of Special Elements used in an OS Command ('OS 
> Command Injection') vulnerability in Apache Airflow Spark Provider, Apache 
> Airflow allows an attacker to read arbtrary files in the task execution 
> context, without write access to DAG files. This issue affects Spark Provider 
> versions prior to 4.0.0. It also impacts any Apache Airflow versions prior to 
> 2.3.0 in case Spark Provider is installed (Spark Provider 4.0.0 can only be 
> installed for Airflow 2.3.0+). Note that you need to manually install the 
> Spark Provider version 4.0.0 in order to get rid of the vulnerability on top 
> of Airflow 2.3.0+ version that has lower version of the Spark Provider 
> installed).
>
> Credit:
>
> Apache Airflow PMC wants to thank id_No2015429 of 3H Security Team for 
> reporting the issue.
>
> References:
>
> https://github.com/apache/airflow/pull/27646
>

Reply via email to