Apache

Spark

20 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 10.34%
  • Published 23.12.2024 16:15:05
  • Last modified 14.07.2025 18:32:34

Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnera...

  • EPSS 91.16%
  • Published 02.05.2023 09:15:10
  • Last modified 13.02.2025 17:16:29

** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the applicati...

  • EPSS 0.28%
  • Published 17.04.2023 08:15:07
  • Last modified 21.11.2024 07:45:41

In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configura...

  • EPSS 0.11%
  • Published 01.11.2022 16:15:13
  • Last modified 06.05.2025 04:16:00

A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be return...

Warning Exploit
  • EPSS 93.27%
  • Published 18.07.2022 07:15:07
  • Last modified 30.07.2025 19:07:53

The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code ...

  • EPSS 0.88%
  • Published 10.03.2022 09:15:07
  • Last modified 21.11.2024 06:16:44

Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. ...

  • EPSS 33.82%
  • Published 26.02.2021 22:15:19
  • Last modified 20.08.2025 10:15:27

In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) ...

  • EPSS 0.6%
  • Published 28.11.2020 01:15:11
  • Last modified 21.11.2024 05:20:52

In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if a...

  • EPSS 87.22%
  • Published 23.06.2020 22:15:14
  • Last modified 21.11.2024 05:40:43

In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an ap...

Exploit
  • EPSS 0.96%
  • Published 29.01.2020 21:15:11
  • Last modified 21.11.2024 04:38:30

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.