This repository has been archived by the owner on Oct 2, 2023. It is now read-only.
CVE-2023-22946 (Critical) detected in spark-core_2.11-2.3.3.jar #139
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2023-22946 - Critical Severity Vulnerability
Vulnerable Library - spark-core_2.11-2.3.3.jar
The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.
Library home page: http://spark.apache.org/
Dependency Hierarchy:
Found in HEAD commit: 7b16df0bfd847c502ac80c1464fe08140edf5d0d
Found in base branch: master
Vulnerability Details
In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications.
Update to Apache Spark 3.4.0 or later, and ensure that
spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its
default of "false", and is not overridden by submitted applications.
Publish Date: 2023-04-17
URL: CVE-2023-22946
CVSS 3 Score Details (9.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://seclists.org/oss-sec/2023/q2/28
Release Date: 2023-04-17
Fix Resolution: org.apache.spark:spark-core:3.4.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: