Lucene search

K

Spark Security Vulnerabilities - 2018

cve
cve

CVE-2018-11770

From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via ...

4.2CVSS

4.3AI Score

0.97EPSS

2018-08-13 04:29 PM
86
2
cve
cve

CVE-2018-11804

Spark's Apache Maven-based build includes a convenience script, 'build/mvn', that downloads and runs a zinc server to speed up compilation. It has been included in release branches since 1.3.x, up to and including master. This server will accept connections from external hosts by default. A special...

7.5CVSS

7.3AI Score

0.004EPSS

2018-10-24 06:29 PM
45
4
cve
cve

CVE-2018-1334

In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.

4.7CVSS

4.7AI Score

0.0004EPSS

2018-07-12 01:29 PM
56
cve
cve

CVE-2018-17190

In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code...

9.8CVSS

8.7AI Score

0.01EPSS

2018-11-19 02:29 PM
98
cve
cve

CVE-2018-8024

In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the u...

5.4CVSS

5.3AI Score

0.0005EPSS

2018-07-12 01:29 PM
81
2