{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T20:25:46.850","vulnerabilities":[{"cve":{"id":"CVE-2023-39553","sourceIdentifier":"security@apache.org","published":"2023-08-11T08:15:09.103","lastModified":"2025-02-13T17:16:54.157","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Drill Provider.\n\nApache Airflow Drill Provider is affected by a vulnerability that allows an attacker to pass in malicious parameters when establishing a connection with DrillHook giving an opportunity to read files on the Airflow server.\nThis issue affects Apache Airflow Drill Provider: before 2.4.3.\nIt is recommended to upgrade to a version that is not affected."},{"lang":"es","value":"Vulnerabilidad de validación de entrada inadecuada en Apache Airflow Drill Provider de Apache Software Foundation.\n\nApache Airflow Drill Provider está afectado por una vulnerabilidad que permite a un atacante pasar parámetros maliciosos al establecer una conexión con DrillHook dando la oportunidad de leer archivos en el servidor Airflow.\nEste problema afecta a Apache Airflow Drill Provider: anterior a 2.4.3.\nSe recomienda actualizar a una versión que no esté afectada."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:apache-airflow-providers-apache-drill:*:*:*:*:*:*:*:*","versionEndExcluding":"2.4.3","matchCriteriaId":"A3513EAE-88C8-489D-AA08-1AB4D382503E"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/08/11/1","source":"security@apache.org","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"https://github.com/apache/airflow/pull/33074","source":"security@apache.org","tags":["Patch"]},{"url":"https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf","source":"security@apache.org","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2023/08/11/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"https://github.com/apache/airflow/pull/33074","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://lists.apache.org/thread/ozpl0opmob49rkcz8svo8wkxyw1395sf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Vendor Advisory"]}]}}]}