2023-08-17 20:00:36 +00:00

36 lines
1.0 KiB
JSON

{
"id": "CVE-2023-40272",
"sourceIdentifier": "security@apache.org",
"published": "2023-08-17T14:15:10.083",
"lastModified": "2023-08-17T19:15:13.143",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Apache Airflow Spark Provider, versions before 4.1.3, is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection giving an opportunity to read files on the Airflow server.\nIt is recommended to upgrade to a version that is not affected.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/08/17/1",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/t03gktyzyor20rh06okd91jtqmw6k1l7",
"source": "security@apache.org"
}
]
}