Apache Spark Command Injection Vulnerability
Summary
| CVE | CVE-2022-33891 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-07-18 07:15:00 UTC |
| Updated | 2023-08-02 17:21:00 UTC |
| Description | The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1. |
Risk And Classification
EPSS: 0.935130000 probability, percentile 0.998280000 (date 2026-04-21)
CISA KEV: Listed on 2023-03-07; due 2023-03-28; ransomware use Unknown
Problem Types: CWE-78
CISA Known Exploited Vulnerability
| Vendor | Apache |
|---|---|
| Product | Spark |
| Name | Apache Spark Command Injection Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://lists.apache.org/thread/p847l3kopoo5bjtmxrcwk21xp6tjxqlc; https://nvd.nist.gov/vuln/detail/CVE-2022-33891 |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Apache Spark Unauthenticated Command Injection ≈ Packet Storm | MISC | packetstormsecurity.com | |
| oss-security - CVE-2023-32007: Apache Spark: Shell command injection via Spark UI | MLIST | www.openwall.com | |
| N/A | CONFIRM | lists.apache.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.