Apache

Spark

20 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Media report
  • EPSS 0.57%
  • Published 18.11.2019 17:15:11
  • Last modified 21.11.2024 04:18:34

A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.

  • EPSS 0.54%
  • Published 07.08.2019 17:15:12
  • Last modified 21.11.2024 04:18:24

Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in S...

  • EPSS 0.5%
  • Published 04.02.2019 17:29:00
  • Last modified 21.11.2024 03:43:58

When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.

  • EPSS 1.21%
  • Published 19.11.2018 14:29:00
  • Last modified 21.11.2024 03:54:03

In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the mast...

  • EPSS 0.64%
  • Published 24.10.2018 18:29:00
  • Last modified 21.11.2024 03:44:04

Spark's Apache Maven-based build includes a convenience script, 'build/mvn', that downloads and runs a zinc server to speed up compilation. It has been included in release branches since 1.3.x, up to and including master. This server will accept conn...

Exploit
  • EPSS 87.7%
  • Published 13.08.2018 16:29:00
  • Last modified 21.11.2024 03:43:59

From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secre...

  • EPSS 56.59%
  • Published 12.07.2018 13:29:00
  • Last modified 21.11.2024 04:13:07

In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause sc...

  • EPSS 0.1%
  • Published 12.07.2018 13:29:00
  • Last modified 21.11.2024 03:59:38

In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.

  • EPSS 0.16%
  • Published 13.09.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an atta...

  • EPSS 1.79%
  • Published 12.07.2017 13:29:00
  • Last modified 20.04.2025 01:37:25

In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history s...