Remote Code Execution Vulnerability in Apache Spark Standalone Resource Manager
CVE-2018-17190

9.8CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
19 November 2018

Summary

Apache Spark's standalone resource manager, present in all versions, contains a vulnerability that allows a specially-crafted request to the master host to execute arbitrary code. Although designed not to execute user code directly on the master, this flaw permits executions that compromise the system. It is important to note that this issue does not affect environments where authentication is enabled, though it raises concerns about unexpected code execution on the master host which typically has limited outbound access compared to worker nodes.

Affected Version(s)

Apache Spark All versions

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.