This repository has been archived by the owner on Oct 2, 2023. It is now read-only.
CVE-2018-17190 (Critical) detected in spark-core_2.11-2.3.3.jar #122
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2018-17190 - Critical Severity Vulnerability
Vulnerable Library - spark-core_2.11-2.3.3.jar
The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.
Library home page: http://spark.apache.org/
Dependency Hierarchy:
Found in HEAD commit: 7b16df0bfd847c502ac80c1464fe08140edf5d0d
Found in base branch: master
Vulnerability Details
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected.
Publish Date: 2018-11-19
URL: CVE-2018-17190
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2018-17190
Release Date: 2018-11-19
Fix Resolution: 2.4.5
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: