Miggo Logo

CVE-2023-40195: Apache Airflow vulnerable arbitrary code execution via Spark server

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.85093%
Published
8/28/2023
Updated
9/6/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
apache-airflow-providers-apache-sparkpip< 4.1.34.1.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from misconfiguration risks rather than specific code flaws. The provided commit (6850b5c) only adds a documentation warning about trusting host settings in Spark connections, indicating the core issue is improper access control to Spark hook configuration (CWE-829) combined with potential deserialization risks (CWE-502) when connecting to untrusted servers. No code changes were made in the patch, and the advisory doesn't identify specific functions handling deserialization or server communication. The vulnerability manifests through the ability to configure connection parameters (like host) rather than a specific function with insecure deserialization logic. Without explicit code examples or function-level patches, we cannot confidently pinpoint vulnerable functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**s*ri*liz*tion o* Untrust** **t*, In*lusion o* *un*tion*lity *rom Untrust** *ontrol Sp**r* vuln*r**ility in *p**** So*tw*r* *oun**tion *p**** *ir*low Sp*rk Provi**r. W**n t** *p**** Sp*rk provi**r is inst*ll** on *n *ir*low **ploym*nt, *n *ir*low u

Reasoning

T** vuln*r**ility st*ms *rom mis*on*i*ur*tion risks r*t**r t**n sp**i*i* *o** *l*ws. T** provi*** *ommit (*******) only ***s * *o*um*nt*tion w*rnin* **out trustin* *ost s*ttin*s in Sp*rk *onn**tions, in*i**tin* t** *or* issu* is improp*r ****ss *ontr