Vulnerability Details : CVE-2023-28710
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Spark Provider.This issue affects Apache Airflow Spark Provider: before 4.0.1.
Vulnerability category: Input validation
Products affected by CVE-2023-28710
- cpe:2.3:a:apache:apache-airflow-providers-apache-spark:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-28710
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-28710
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2023-28710
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by:
- nvd@nist.gov (Primary)
- security@apache.org (Secondary)
References for CVE-2023-28710
-
https://lists.apache.org/thread/lb9w9114ow00h2nkn8bjm106v5x1p1d2
CVE-2023-28710: Apache Airflow Spark Provider Arbitrary File Read via JDBC-Apache Mail ArchivesMailing List;Vendor Advisory
-
https://github.com/apache/airflow/pull/30223
Validate host and schema for Spark JDBC Hook by potiuk · Pull Request #30223 · apache/airflow · GitHubVendor Advisory
-
http://www.openwall.com/lists/oss-security/2023/04/07/3
oss-security - CVE-2023-28710: Apache Airflow Spark Provider Arbitrary File Read via JDBCMailing List;Third Party Advisory
Jump to