CVE-2023-33234 – apache-airflow-providers-cncf-kubernetes
Package
Manager: pip
Name: apache-airflow-providers-cncf-kubernetes
Vulnerable Version: >=5.0.0 <7.0.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00264 pctl0.4964
Details
Apache Airflow CNCF Kubernetes Provider: KubernetesPodOperator RCE via connection configuration Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection. In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner. Operators should upgrade to provider version 7.0.0 which has removed the vulnerability.
Metadata
Created: 2023-07-06T21:15:06Z
Modified: 2023-07-06T23:54:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-2rx4-9f5h-9gjf/GHSA-2rx4-9f5h-9gjf.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-2rx4-9f5h-9gjf
Finding: F184
Auto approve: 1