Remote Code Execution in Apache Spark's Standalone Resource Manager
CVE-2020-9480
Summary
In Apache Spark versions 2.4.5 and earlier, a security flaw exists in the standalone resource manager where the master may be configured to require authentication via a shared secret. However, with this configuration enabled, an attacker can exploit the system by sending a specially crafted remote procedure call (RPC), successfully starting resources for an application without the required shared key. This breach can allow the execution of shell commands on the host machine, posing a severe security risk for administrators relying on this mode of operation. This vulnerability does not impact Spark clusters utilizing other resource managers like YARN or Mesos.
Affected Version(s)
Apache Spark Apache Spark 2.4.5 and earlier
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved