Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1yMmY2LTY5MjgtZmg4Zs4AA1XP

Apache Airflow Spark Provider Improper Input Validation vulnerability

Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server.
It is recommended to upgrade to a version that is not affected.

Permalink: https://github.com/advisories/GHSA-r2f6-6928-fh8f
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yMmY2LTY5MjgtZmg4Zs4AA1XP
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 9 months ago
Updated: 6 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-r2f6-6928-fh8f, CVE-2023-40272
References: Blast Radius: 13.8

Affected Packages

pypi:apache-airflow-providers-apache-spark
Dependent packages: 5
Dependent repositories: 69
Downloads: 184,375 last month
Affected Version Ranges: < 4.1.3
Fixed in: 4.1.3
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 3.0.0, 4.0.0, 4.0.1, 4.1.0, 4.1.1, 4.1.2
All unaffected versions: 4.1.3, 4.1.4, 4.1.5, 4.2.0, 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.7.1, 4.7.2, 4.8.0