Vulnerability Details CVE-2023-40272
Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server.
It is recommended to upgrade to a version that is not affected.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 67.8%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-40272
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:-
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:1.0.0
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:1.0.1
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:1.0.2
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:1.0.3
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:2.0.0
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:2.0.1
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:2.0.2
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:2.0.3
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:2.1.0
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:2.1.1
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:2.1.2
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:2.1.3
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:2.3.0
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:3.0.0
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:4.0.0
-
cpe:2.3:a:apache:apache-airflow-providers-apache-spark:4.0.1