|
|
Message-ID: <401138d7-2d02-f558-faf2-3ed8575e4a91@apache.org> Date: Thu, 12 Mar 2026 16:40:43 +0000 From: György Gál <ggal@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-60012: Apache Livy: Restrict file access Severity: important Affected versions: - Apache Livy (org.apache.livy:livy-server) 0.7.0-incubating before 0.9.0-incubating Description: Malicious configuration can lead to unauthorized file access in Apache Livy. This issue affects Apache Livy 0.7.0 and 0.8.0 when connecting to Apache Spark 3.1 or later. A request that includes a Spark configuration value supported from Apache Spark version 3.1 can lead to users gaining access to files they do not have permissions to. For the vulnerability to be exploitable, the user needs to have access to Apache Livy's REST or JDBC interface and be able to send requests with arbitrary Spark configuration values. Users are recommended to upgrade to version 0.9.0 or later, which fixes the issue. Credit: Furue Hideyuki (finder) References: https://livy.incubator.apache.org https://www.cve.org/CVERecord?id=CVE-2025-60012
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.