
=====================================================================

                               CERT-Renater

                    Note d'Information No. 2022/VULN429

_____________________________________________________________________

DATE                : 22/11/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Spark Provider versions
                                  prior to 4.0.0,
                       Apache Airflow versions prior to 2.3.0.

=====================================================================
https://lists.apache.org/thread/0tmdlnmjs5t4gsx5fy73tb6zd3jztq45
_____________________________________________________________________

CVE-2022-40954: Apache Airflow Spark Provider, Apache Airflow:
Airflow 2.3.4 spark provider RCE that bypass restrictions to read
arbitrary files
Description:

Improper Neutralization of Special Elements used in an OS Command
('OS Command Injection') vulnerability in Apache Airflow Spark
Provider, Apache Airflow allows an attacker to read arbtrary files
in the task execution context, without write access to DAG files.
This issue affects Spark Provider versions prior to 4.0.0. It
also impacts any Apache Airflow versions prior to 2.3.0 in
case Spark Provider is installed (Spark Provider 4.0.0 can only
be installed for Airflow 2.3.0+). Note that you need to manually
install the Spark Provider version 4.0.0 in order to get rid of
the vulnerability on top of Airflow 2.3.0+ version that has lower
version of the Spark Provider installed).

Credit:

Apache Airflow PMC wants to thank id_No2015429 of 3H Security Team
for reporting the issue.

References:

https://github.com/apache/airflow/pull/27646



=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================


