QID 980958

QID 980958: Java (maven) Security Update for org.apache.spark:spark-core_2.10 (GHSA-phg2-9c5g-m4q7)

In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected.

# Mitigation
Enable authentication on any Spark standalone cluster that is not otherwise secured from unwanted access, for example by network-level restrictions. Use spark.authenticate and related security properties described at https://spark.apache.org/docs/latest/security.html

Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to refer to GHSA-phg2-9c5g-m4q7 for updates pertaining to this vulnerability.
    Vendor References

    CVEs related to QID 980958

    Software Advisories
    Advisory ID Software Component Link
    GHSA-phg2-9c5g-m4q7 org.apache.spark:spark-core_2.10 URL Logo github.com/advisories/GHSA-phg2-9c5g-m4q7
    GHSA-phg2-9c5g-m4q7 org.apache.spark:spark-core_2.11 URL Logo github.com/advisories/GHSA-phg2-9c5g-m4q7