Remote Code Execution in Apache Spark's Standalone Resource Manager
CVE-2020-9480

9.8CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
23 June 2020

Summary

In Apache Spark versions 2.4.5 and earlier, a security flaw exists in the standalone resource manager where the master may be configured to require authentication via a shared secret. However, with this configuration enabled, an attacker can exploit the system by sending a specially crafted remote procedure call (RPC), successfully starting resources for an application without the required shared key. This breach can allow the execution of shell commands on the host machine, posing a severe security risk for administrators relying on this mode of operation. This vulnerability does not impact Spark clusters utilizing other resource managers like YARN or Mesos.

Affected Version(s)

Apache Spark Apache Spark 2.4.5 and earlier

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.