CVE-2025-55039
- EPSS 0.06%
- Veröffentlicht 15.10.2025 07:19:25
- Zuletzt bearbeitet 04.11.2025 22:16:30
This issue affects Apache Spark versions before 3.4.4, 3.5.2 and 4.0.0. Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes. When spark.network.crypto.enabled ...
CVE-2024-23945
- EPSS 7.65%
- Veröffentlicht 23.12.2024 16:15:05
- Zuletzt bearbeitet 14.07.2025 18:32:34
Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnera...
CVE-2023-32007
- EPSS 91.16%
- Veröffentlicht 02.05.2023 09:15:10
- Zuletzt bearbeitet 13.02.2025 17:16:29
** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the applicati...
CVE-2023-22946
- EPSS 0.28%
- Veröffentlicht 17.04.2023 08:15:07
- Zuletzt bearbeitet 21.11.2024 07:45:41
In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configura...
CVE-2022-31777
- EPSS 0.13%
- Veröffentlicht 01.11.2022 16:15:13
- Zuletzt bearbeitet 06.05.2025 04:16:00
A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be return...
CVE-2022-33891
- EPSS 93.62%
- Veröffentlicht 18.07.2022 07:15:07
- Zuletzt bearbeitet 23.10.2025 14:48:51
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code ...
CVE-2021-38296
- EPSS 0.88%
- Veröffentlicht 10.03.2022 09:15:07
- Zuletzt bearbeitet 21.11.2024 06:16:44
Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. ...
CVE-2020-27223
- EPSS 33.82%
- Veröffentlicht 26.02.2021 22:15:19
- Zuletzt bearbeitet 20.08.2025 10:15:27
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) ...
CVE-2020-27218
- EPSS 0.6%
- Veröffentlicht 28.11.2020 01:15:11
- Zuletzt bearbeitet 21.11.2024 05:20:52
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if a...
CVE-2020-9480
- EPSS 93.3%
- Veröffentlicht 23.06.2020 22:15:14
- Zuletzt bearbeitet 21.11.2024 05:40:43
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an ap...