Количество 3
Количество 3
CVE-2023-27604
Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections. It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.
GHSA-g3m9-pr5m-4cvp
Airflow Sqoop Provider RCE Vulnerability
BDU:2023-05966
Уязвимость плагина Airflow Sqoop Provider программного обеспечения создания, мониторинга и оркестрации сценариев обработки данных Airflow, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-27604 Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections. It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it. | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад | |
GHSA-g3m9-pr5m-4cvp Airflow Sqoop Provider RCE Vulnerability | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад | |
BDU:2023-05966 Уязвимость плагина Airflow Sqoop Provider программного обеспечения создания, мониторинга и оркестрации сценариев обработки данных Airflow, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу