Apache Spark Standalone Master REST API Vulnerability Exposing Job Submission
CVE-2018-11770
Key Information:
- Vendor
- Apache
- Status
- Vendor
- CVE Published:
- 13 August 2018
Badges
Summary
In Apache Spark version 1.3.0 and later, the standalone master exposes a REST API for job submission that lacks adequate authentication measures. While the spark-submit mechanism leverages a shared secret for authentication via the 'spark.authenticate.secret' configuration property, this does not extend to the REST API. As a result, a user can submit a driver program without any authentication, although launching executors is restricted. This vulnerability also affects Mesos setups using the REST API for job submission in cluster mode. Future updates to Spark aim to clarify the documentation regarding this issue, and plans are in place to disable the REST API by default to enhance security.
Affected Version(s)
Apache Spark 1.3.0 < 2.4.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
96% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved