Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <401138d7-2d02-f558-faf2-3ed8575e4a91@apache.org>
Date: Thu, 12 Mar 2026 16:40:43 +0000
From: György Gál <ggal@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-60012: Apache Livy: Restrict file access 

Severity: important 

Affected versions:

- Apache Livy (org.apache.livy:livy-server) 0.7.0-incubating before 0.9.0-incubating

Description:

Malicious configuration can lead to unauthorized file access in Apache Livy.

This issue affects Apache Livy 0.7.0 and 0.8.0 when connecting to Apache Spark 3.1 or later.

A request that includes a Spark configuration value supported from Apache Spark version 3.1 can lead to users gaining access to files they do not have permissions to.

For the vulnerability to be exploitable, the user needs to have access to Apache Livy's REST or JDBC interface and be able to send requests with arbitrary Spark configuration values.

Users are recommended to upgrade to version 0.9.0 or later, which fixes the issue.

Credit:

Furue Hideyuki (finder)

References:

https://livy.incubator.apache.org
https://www.cve.org/CVERecord?id=CVE-2025-60012

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.