Skip to content
This repository has been archived by the owner on Oct 2, 2023. It is now read-only.

CVE-2022-33891 (High) detected in spark-core_2.11-2.3.3.jar #133

Open
mend-bolt-for-github bot opened this issue Jul 19, 2022 · 0 comments
Open

CVE-2022-33891 (High) detected in spark-core_2.11-2.3.3.jar #133

mend-bolt-for-github bot opened this issue Jul 19, 2022 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link

mend-bolt-for-github bot commented Jul 19, 2022

CVE-2022-33891 - High Severity Vulnerability

Vulnerable Library - spark-core_2.11-2.3.3.jar

The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.

Library home page: http://spark.apache.org/

Dependency Hierarchy:

  • spark-core_2.11-2.3.3.jar (Vulnerable Library)

Found in HEAD commit: 7b16df0bfd847c502ac80c1464fe08140edf5d0d

Found in base branch: master

Vulnerability Details

The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.

Publish Date: 2022-07-18

URL: CVE-2022-33891

CVSS 3 Score Details (8.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-4x9r-j582-cgr8

Release Date: 2022-07-18

Fix Resolution: org.apache.spark:spark-core:3.1.3,3.2.2,3.3.0, pyspark - 3.1.3,3.2.2


Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Jul 19, 2022
@mend-bolt-for-github mend-bolt-for-github bot changed the title CVE-2022-33891 (Medium) detected in spark-core_2.11-2.3.3.jar CVE-2022-33891 (High) detected in spark-core_2.11-2.3.3.jar Oct 3, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

0 participants