CVE-2023-27604

Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections. It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:airflow_sqoop_provider:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:53

Type Values Removed Values Added
References () https://github.com/apache/airflow/pull/33039 - Patch, Vendor Advisory () https://github.com/apache/airflow/pull/33039 - Patch, Vendor Advisory
References () https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgd - Mailing List, Vendor Advisory () https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgd - Mailing List, Vendor Advisory

01 Sep 2023, 17:11

Type Values Removed Values Added
First Time Apache airflow Sqoop Provider
Apache
CPE cpe:2.3:a:apache:airflow_sqoop_provider:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References (MISC) https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgd - (MISC) https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgd - Mailing List, Vendor Advisory
References (MISC) https://github.com/apache/airflow/pull/33039 - (MISC) https://github.com/apache/airflow/pull/33039 - Patch, Vendor Advisory

28 Aug 2023, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-28 08:15

Updated : 2024-11-21 07:53


NVD link : CVE-2023-27604

Mitre link : CVE-2023-27604

CVE.ORG link : CVE-2023-27604


JSON object : View

Products Affected

apache

  • airflow_sqoop_provider
CWE
CWE-20

Improper Input Validation