In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0774 | In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs. |
Github GHSA |
GHSA-r34r-f84j-5x4x | Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-05T16:12:27.760Z
Reserved: 2017-04-11T00:00:00.000Z
Link: CVE-2017-7678
No data.
Status : Deferred
Published: 2017-07-12T13:29:00.267
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-7678
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA