Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-40954
PUBLISHED
More InfoOfficial Page
Assigner-apache
Assigner Org ID-f0158376-9dc2-43b6-827c-5f631a4d8d09
View Known Exploited Vulnerability (KEV) details
Published At-22 Nov, 2022 | 00:00
Updated At-29 Apr, 2025 | 13:50
Rejected At-
▼CVE Numbering Authority (CNA)
Apache Airflow Spark Provider RCE that bypass restrictions to read arbitrary files

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Spark Provider, Apache Airflow allows an attacker to read arbtrary files in the task execution context, without write access to DAG files. This issue affects Spark Provider versions prior to 4.0.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case Spark Provider is installed (Spark Provider 4.0.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the Spark Provider version 4.0.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version that has lower version of the Spark Provider installed).

Affected Products
Vendor
The Apache Software FoundationApache Software Foundation
Product
Apache Airflow Spark Provider
Versions
Affected
  • From unspecified before 4.0.0 (custom)
Vendor
The Apache Software FoundationApache Software Foundation
Product
Apache Airflow
Versions
Affected
  • From unspecified before 2.3.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Type: CWE
CWE ID: CWE-78
Description: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
unknown
other:
moderate
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Apache Airflow PMC wants to thank id_No2015429 of 3H Security Team for reporting the issue.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/apache/airflow/pull/27646
N/A
https://lists.apache.org/thread/0tmdlnmjs5t4gsx5fy73tb6zd3jztq45
N/A
Hyperlink: https://github.com/apache/airflow/pull/27646
Resource: N/A
Hyperlink: https://lists.apache.org/thread/0tmdlnmjs5t4gsx5fy73tb6zd3jztq45
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/apache/airflow/pull/27646
x_transferred
https://lists.apache.org/thread/0tmdlnmjs5t4gsx5fy73tb6zd3jztq45
x_transferred
Hyperlink: https://github.com/apache/airflow/pull/27646
Resource:
x_transferred
Hyperlink: https://lists.apache.org/thread/0tmdlnmjs5t4gsx5fy73tb6zd3jztq45
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found