Home » Database

AVID-2026-R1226

Description

Apache Airflow Sqoop Provider: Airflow Sqoop Provider RCE Vulnerability (CVE-2023-27604)

Details

Apache Airflow Sqoop Provider, versions before 4.0.0, is affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import –connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections.

It is recommended to upgrade to a version that is not affected. This issue was reported independently by happyhacking-k, And Xie Jianming and LiuHui of Caiji Sec Team also reported it.

Reason for inclusion in AVID: CVE-2023-27604 describes an RCE vulnerability in Apache Airflow Sqoop Provider that can be exploited through crafted connection parameters. Airflow is widely used to orchestrate data pipelines, including AI/ML workflows; thus this is a software supply-chain vulnerability affecting components commonly used to build/run AI systems. It targets a software artifact (the Sqoop provider) and is a security risk (RCE) with evidence in the advisory.

References

Affected or Relevant Artifacts

  • Developer: Apache Software Foundation
  • Deployer: Apache Software Foundation
  • Artifact Details:
TypeName
SystemApache Airflow Sqoop Provider

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CWE

IDDescription
CWE-20CWE-20 Improper Input Validation

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2023-08-28
  • Version: 0.3.3
  • AVID Entry