Remote Code Execution Vulnerability in Apache Spark Standalone Resource Manager
CVE-2018-17190
9.8CRITICAL
Summary
Apache Spark's standalone resource manager, present in all versions, contains a vulnerability that allows a specially-crafted request to the master host to execute arbitrary code. Although designed not to execute user code directly on the master, this flaw permits executions that compromise the system. It is important to note that this issue does not affect environments where authentication is enabled, though it raises concerns about unexpected code execution on the master host which typically has limited outbound access compared to worker nodes.
Affected Version(s)
Apache Spark All versions
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved