Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server. It is recommended to upgrade to a version that is not affected.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7 | mailing list vendor advisory |
http://www.openwall.com/lists/oss-security/2023/08/17/1 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/08/18/1 | third party advisory mailing list |