Apache

Spark

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.6%
  • Veröffentlicht 28.11.2020 01:15:11
  • Zuletzt bearbeitet 21.11.2024 05:20:52

In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if a...

  • EPSS 91.58%
  • Veröffentlicht 23.06.2020 22:15:14
  • Zuletzt bearbeitet 21.11.2024 05:40:43

In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an ap...

Exploit
  • EPSS 2.84%
  • Veröffentlicht 29.01.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:38:30

HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.

Medienbericht
  • EPSS 0.56%
  • Veröffentlicht 18.11.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:18:34

A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.

  • EPSS 0.54%
  • Veröffentlicht 07.08.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:24

Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in S...

  • EPSS 0.47%
  • Veröffentlicht 04.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:58

When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.

  • EPSS 1.21%
  • Veröffentlicht 19.11.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:03

In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the mast...

  • EPSS 0.72%
  • Veröffentlicht 24.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:04

Spark's Apache Maven-based build includes a convenience script, 'build/mvn', that downloads and runs a zinc server to speed up compilation. It has been included in release branches since 1.3.x, up to and including master. This server will accept conn...

Exploit
  • EPSS 89.57%
  • Veröffentlicht 13.08.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:59

From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secre...

  • EPSS 50.25%
  • Veröffentlicht 12.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:13:07

In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause sc...