Lucene search

K
ApacheSpark

20 matches found

CVE
CVE
added 2024/12/23 4:15 p.m.747 views

CVE-2024-23945

Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service ...

5.9CVSS6.7AI score0.05715EPSS
CVE
CVE
added 2022/07/18 7:15 a.m.606 views

CVE-2022-33891

The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to p...

8.8CVSS8.9AI score0.93271EPSS
CVE
CVE
added 2019/11/18 5:15 p.m.476 views

CVE-2019-10172

A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.

7.5CVSS8.6AI score0.0057EPSS
CVE
CVE
added 2020/11/28 1:15 a.m.406 views

CVE-2020-27218

In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is...

5.8CVSS5.1AI score0.00599EPSS
CVE
CVE
added 2020/01/29 9:15 p.m.346 views

CVE-2019-20445

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.

9.1CVSS8.9AI score0.00451EPSS
CVE
CVE
added 2021/02/26 10:15 p.m.295 views

CVE-2020-27223

In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those qual...

5.3CVSS5.2AI score0.26008EPSS
CVE
CVE
added 2023/05/02 9:15 a.m.240 views

CVE-2023-32007

** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecur...

8.8CVSS8.9AI score0.93271EPSS
CVE
CVE
added 2018/07/12 1:29 p.m.223 views

CVE-2018-8024

In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the u...

5.4CVSS5.3AI score0.53445EPSS
CVE
CVE
added 2020/06/23 10:15 p.m.139 views

CVE-2020-9480

In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even ...

9.8CVSS9.4AI score0.80619EPSS
CVE
CVE
added 2022/03/10 9:15 a.m.129 views

CVE-2021-38296

Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would a...

7.5CVSS7.8AI score0.01132EPSS
CVE
CVE
added 2018/11/19 2:29 p.m.116 views

CVE-2018-17190

In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code...

9.8CVSS8.7AI score0.01118EPSS
CVE
CVE
added 2022/11/01 4:15 p.m.103 views

CVE-2022-31777

A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI.

5.4CVSS5.5AI score0.00245EPSS
CVE
CVE
added 2018/08/13 4:29 p.m.95 views

CVE-2018-11770

From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via ...

4.9CVSS4.3AI score0.87702EPSS
CVE
CVE
added 2017/07/12 1:29 p.m.82 views

CVE-2017-7678

In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, w...

6.1CVSS6.2AI score0.0179EPSS
CVE
CVE
added 2019/08/07 5:15 p.m.81 views

CVE-2019-10099

Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broad...

7.5CVSS7.3AI score0.00542EPSS
CVE
CVE
added 2019/02/04 5:29 p.m.77 views

CVE-2018-11760

When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.

5.5CVSS5.5AI score0.005EPSS
CVE
CVE
added 2023/04/17 8:15 a.m.73 views

CVE-2023-22946

In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affec...

9.9CVSS8AI score0.00283EPSS
CVE
CVE
added 2018/07/12 1:29 p.m.70 views

CVE-2018-1334

In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.

4.7CVSS4.7AI score0.00078EPSS
CVE
CVE
added 2018/10/24 6:29 p.m.60 views

CVE-2018-11804

Spark's Apache Maven-based build includes a convenience script, 'build/mvn', that downloads and runs a zinc server to speed up compilation. It has been included in release branches since 1.3.x, up to and including master. This server will accept connections from external hosts by default. A special...

7.5CVSS7.3AI score0.00652EPSS
CVE
CVE
added 2017/09/13 4:29 p.m.59 views

CVE-2017-12612

In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local...

7.8CVSS7.9AI score0.00155EPSS