Apache Airflow Sqoop Provider Vulnerability: Remote Code Execution via Connection Parameters

Apache Airflow Sqoop Provider Vulnerability: Remote Code Execution via Connection Parameters

CVE-2023-27604 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections. It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.

Learn more about our Cis Benchmark Audit For Server Software.