Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-g3m9-pr5m-4cvp: Airflow Sqoop Provider RCE Vulnerability

Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections.

It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.

ghsa
#vulnerability#apache#git#rce#auth
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-27604

Airflow Sqoop Provider RCE Vulnerability

Moderate severity GitHub Reviewed Published Aug 28, 2023 to the GitHub Advisory Database • Updated Aug 30, 2023

Package

pip apache-airflow-providers-apache-sqoop (pip)

Affected versions

< 4.0.0

Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections.

It is recommended to upgrade to a version that is not affected.
This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.

References

  • https://nvd.nist.gov/vuln/detail/CVE-2023-27604
  • apache/airflow#33039
  • https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgd

Published to the GitHub Advisory Database

Aug 28, 2023

Last updated

Aug 30, 2023

Related news

CVE-2023-27604: Validate SqoopHook connection string and disable extra options from public hook methods by pankajkoti · Pull Request #33039 · apache/airflow

Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections. It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.