Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 18 Nov 2018 09:37:02 -0600
From: Sean Owen <srowen@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2018-17190: Unsecured Apache Spark standalone executes user code

Severity: Low

Vendor: The Apache Software Foundation

Versions Affected:
All versions of Apache Spark

Description:
Spark's standalone resource manager accepts code to execute on a 'master' host,
that then runs that code on 'worker' hosts. The master itself does not, by
design, execute user code. A specially-crafted request to the master can,
however, cause the master to execute code too. Note that this does not affect
standalone clusters with authentication enabled. While the master host
typically has less outbound access to other resources than a worker, the
execution of code on the master is nevertheless unexpected.

Mitigation:
Enable authentication on any Spark standalone cluster that is not otherwise
secured from unwanted access, for example by network-level restrictions. Use
spark.authenticate and related security properties described at
https://spark.apache.org/docs/latest/security.html

Credit:
Andre Protas, Apple Information Security

References:
https://spark.apache.org/security.html

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.