Description:

Improper Neutralization of Special Elements used in an OS Command ('OS Command 
Injection') vulnerability in Apache Airflow Spark Provider, Apache Airflow 
allows an attacker to read arbtrary files in the task execution context, 
without write access to DAG files. This issue affects Spark Provider versions 
prior to 4.0.0. It also impacts any Apache Airflow versions prior to 2.3.0 in 
case Spark Provider is installed (Spark Provider 4.0.0 can only be installed 
for Airflow 2.3.0+). Note that you need to manually install the Spark Provider 
version 4.0.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ 
version that has lower version of the Spark Provider installed).

Credit:

Apache Airflow PMC wants to thank id_No2015429 of 3H Security Team for 
reporting the issue.

References:

https://github.com/apache/airflow/pull/27646

Reply via email to