Description
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider.
Airflow JDBC Provider Connection’s [Connection URL] parameters had no
restrictions, which made it possible to implement RCE attacks via
different type JDBC drivers, obtain airflow server permission.
This issue affects Apache Airflow JDBC Provider: before 4.0.0.


Published: 2023-06-29
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-1843 Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider. Airflow JDBC Provider Connection’s [Connection URL] parameters had no restrictions, which made it possible to implement RCE attacks via different type JDBC drivers, obtain airflow server permission. This issue affects Apache Airflow JDBC Provider: before 4.0.0.
Github GHSA Github GHSA GHSA-mm87-c3x2-6f89 Apache Airflow JDBC Provider Improper Input Validation vulnerability
History

Mon, 07 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Apache Apache-airflow-providers-jdbc
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-10-07T18:27:17.133Z

Reserved: 2023-01-09T19:24:49.530Z

Link: CVE-2023-22886

cve-icon Vulnrichment

Updated: 2024-08-02T10:20:31.306Z

cve-icon NVD

Status : Modified

Published: 2023-06-29T10:15:09.650

Modified: 2024-11-21T07:45:34.853

Link: CVE-2023-22886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses