CVE-2023-27604
28.08.2023, 08:15
Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections. It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| apache | airflow_sqoop_provider | 𝑥 < 4.0.0 |
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| apache | airflow_sqoop_provider | 𝑥 < 4.0.0 | ADP |
Common Weakness Enumeration