Loading HuntDB...

GHSA-8q28-pw9g-w82c

GitHub Security Advisory

Apache Airflow vulnerable arbitrary code execution via Spark server

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider.

When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users.

To view the warning in the docs please visit  https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html

Affected Packages

PyPI apache-airflow-providers-apache-spark
Affected versions: 0 (fixed in 4.1.3)

Related CVEs

Key Information

GHSA ID
GHSA-8q28-pw9g-w82c
Published
August 28, 2023 9:30 AM
Last Modified
September 6, 2024 6:08 PM
CVSS Score
7.5 /10
Primary Ecosystem
PyPI
Primary Package
apache-airflow-providers-apache-spark
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 27, 2025 6:35 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.