Safety vulnerability ID: 64556
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Apache Airflow Sqoop Provider versions before 4.0.0 are affected by a vulnerability that allows an attacker pass parameters with the connections, which makes it possible to implement RCE attacks via ‘sqoop import --connect’, obtain airflow server permissions, etc. The attacker needs to be logged in and have authorization (permissions) to create/edit connections.
Latest version: 4.2.1
Provider package apache-airflow-providers-apache-sqoop for Apache Airflow
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application