Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1mZmo5LTRjcmMtcTd3Zs4AAyn3

Apache Airflow Spark Provider vulnerable to improper input validation

Apache Software Foundation Apache Airflow Spark Provider before 4.0.1 is vulnerable to improper input validation because the host and schema of JDBC Hook can contain / and ? which is used to denote the end of the field.

Permalink: https://github.com/advisories/GHSA-ffj9-4crc-q7wf
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mZmo5LTRjcmMtcTd3Zs4AAyn3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-ffj9-4crc-q7wf, CVE-2023-28710
References: Repository: https://github.com/apache/airflow
Blast Radius: 13.8

Affected Packages

pypi:apache-airflow-providers-apache-spark
Dependent packages: 5
Dependent repositories: 69
Downloads: 184,375 last month
Affected Version Ranges: < 4.0.1
Fixed in: 4.0.1
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 3.0.0, 4.0.0
All unaffected versions: 4.0.1, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.2.0, 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.7.1, 4.7.2, 4.8.0