Apache

Spark

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.57%
  • Veröffentlicht 18.11.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:18:34

A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.

  • EPSS 0.54%
  • Veröffentlicht 07.08.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:24

Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in S...

  • EPSS 0.5%
  • Veröffentlicht 04.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:58

When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.

  • EPSS 1.21%
  • Veröffentlicht 19.11.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:03

In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the mast...

  • EPSS 0.64%
  • Veröffentlicht 24.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:04

Spark's Apache Maven-based build includes a convenience script, 'build/mvn', that downloads and runs a zinc server to speed up compilation. It has been included in release branches since 1.3.x, up to and including master. This server will accept conn...

Exploit
  • EPSS 87.7%
  • Veröffentlicht 13.08.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:59

From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secre...

  • EPSS 56.59%
  • Veröffentlicht 12.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:13:07

In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause sc...

  • EPSS 0.1%
  • Veröffentlicht 12.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:38

In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.

  • EPSS 0.16%
  • Veröffentlicht 13.09.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an atta...

  • EPSS 1.79%
  • Veröffentlicht 12.07.2017 13:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history s...