GHSA-mm87-c3x2-6f89

Suggest an improvement
Source
https://github.com/advisories/GHSA-mm87-c3x2-6f89
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-mm87-c3x2-6f89/GHSA-mm87-c3x2-6f89.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mm87-c3x2-6f89
Aliases
Published
2023-06-29T12:30:24Z
Modified
2024-02-16T08:21:22.880104Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Apache Airflow JDBC Provider Improper Input Validation vulnerability
Details

Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider. Airflow JDBC Provider Connection’s [Connection URL] parameters had no restrictions, which made it possible to implement RCE attacks via different type JDBC drivers, obtain airflow server permission. This issue affects Apache Airflow JDBC Provider: before 4.0.0.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": "2023-06-29T10:15:09Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "github_reviewed_at": "2023-06-30T20:40:04Z",
    "severity": "HIGH"
}
References

Affected packages

PyPI / apache-airflow-providers-jdbc

Package

Name
apache-airflow-providers-jdbc
View open source insights on deps.dev
Purl
pkg:pypi/apache-airflow-providers-jdbc

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.0

Affected versions

1.*
1.0.0b1
1.0.0b2
1.0.0rc1
1.0.0
1.0.1rc1
1.0.1
2.*
2.0.0rc1
2.0.0rc2
2.0.0
2.0.1rc1
2.0.1
2.1.0rc1
2.1.0rc2
2.1.0
2.1.1rc1
2.1.1
2.1.2rc1
2.1.2
2.1.3rc1
2.1.3
3.*
3.0.0rc1
3.0.0rc2
3.0.0
3.1.0rc1
3.1.0
3.2.0rc1
3.2.0rc2
3.2.0rc3
3.2.0
3.2.1rc1
3.2.1
3.3.0rc1
3.3.0rc2
3.3.0rc3
3.3.0
3.4.0rc1
3.4.0rc2
3.4.0
4.*
4.0.0rc1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-mm87-c3x2-6f89/GHSA-mm87-c3x2-6f89.json"