This repository has been archived by the owner on Oct 2, 2023. It is now read-only.
CVE-2022-33891 (High) detected in spark-core_2.11-2.3.3.jar #133
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2022-33891 - High Severity Vulnerability
Vulnerable Library - spark-core_2.11-2.3.3.jar
The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.
Library home page: http://spark.apache.org/
Dependency Hierarchy:
Found in HEAD commit: 7b16df0bfd847c502ac80c1464fe08140edf5d0d
Found in base branch: master
Vulnerability Details
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.
Publish Date: 2022-07-18
URL: CVE-2022-33891
CVSS 3 Score Details (8.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-4x9r-j582-cgr8
Release Date: 2022-07-18
Fix Resolution: org.apache.spark:spark-core:3.1.3,3.2.2,3.3.0, pyspark - 3.1.3,3.2.2
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: