Severity: moderate

Affected versions:

- Apache Airflow Sqoop Provider before 4.0.0

Description:

Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a 
vulnerability that allows an attacker pass parameters with the connections, 
which makes it possible to implement RCE attacks via ‘sqoop import --connect’, 
obtain airflow server permissions, etc. The attacker needs to be logged in and 
have authorization (permissions) to create/edit connections.

 It is recommended to upgrade to a version that is not affected.
This issue was reported independently by happyhacking-k, And Xie Jianming and 
LiuHui of Caiji Sec Team also reported it.

Credit:

happyhacking-k (finder)
Xie Jianming of Caiji Sec Team (finder)
Liu Hui of Caiji Sec Team (finder)

References:

https://github.com/apache/airflow/pull/33039
https://airflow.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-27604

Reply via email to