Headline
GHSA-8q28-pw9g-w82c: Apache Airflow vulnerable arbitrary code execution via Spark server
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider.
When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users.
To view the warning in the docs please visit https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-40195
Apache Airflow vulnerable arbitrary code execution via Spark server
Moderate severity GitHub Reviewed Published Aug 28, 2023 to the GitHub Advisory Database • Updated Aug 30, 2023
Vulnerability details Dependabot alerts 0
Package
pip apache-airflow-providers-apache-spark (pip)
Affected versions
< 4.1.3
Patched versions
None
Description
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider.
When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users.
To view the warning in the docs please visit https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html
References
- https://nvd.nist.gov/vuln/detail/CVE-2023-40195
- apache/airflow#33233
- https://lists.apache.org/thread/fzy95b1d6zv31j5wrx3znhzcscck2o24
- apache/airflow@6850b5c
Published to the GitHub Advisory Database
Aug 28, 2023
Last updated
Aug 30, 2023
Reviewed
Aug 30, 2023
Severity
Moderate
Weaknesses
CWE-502
CVE ID
CVE-2023-40195
GHSA ID
GHSA-8q28-pw9g-w82c
Source code
apache/airflow
Checking history
See something to contribute? Suggest improvements for this vulnerability.
Related news
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider. When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users. To view the warning in the docs please visit https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html