Airflow Sqoop Provider RCE Vulnerability
High severity
GitHub Reviewed
Published
Aug 28, 2023
to the GitHub Advisory Database
•
Updated Nov 9, 2023
Package
Affected versions
< 4.0.0
Patched versions
4.0.0
Description
Published by the National Vulnerability Database
Aug 28, 2023
Published to the GitHub Advisory Database
Aug 28, 2023
Reviewed
Aug 30, 2023
Last updated
Nov 9, 2023
Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections.
It is recommended to upgrade to a version that is not affected.
This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.
References