Vulnerability Description
Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections. It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Airflow Sqoop Provider | < 4.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/apache/airflow/pull/33039PatchVendor Advisory
- https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgdMailing ListVendor Advisory
- https://github.com/apache/airflow/pull/33039PatchVendor Advisory
- https://lists.apache.org/thread/lswlxf11do51ob7f6xyyg8qp3n7wdrgdMailing ListVendor Advisory
FAQ
What is CVE-2023-27604?
CVE-2023-27604 is a vulnerability with a CVSS score of 8.8 (HIGH). Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ...
How severe is CVE-2023-27604?
CVE-2023-27604 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-27604?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Airflow Sqoop Provider.