Description
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
Published: 2020-06-23
Score: 9.8 Critical
EPSS: 90.6% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wgx7-jwwm-cgjv Improper Authentication in Apache Spark
History

No history.

Subscriptions

Apache Spark
Oracle Business Intelligence
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T10:26:16.324Z

Reserved: 2020-03-01T00:00:00.000Z

Link: CVE-2020-9480

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-23T22:15:14.137

Modified: 2024-11-21T05:40:43.943

Link: CVE-2020-9480

cve-icon Redhat

Severity : Important

Publid Date: 2020-06-22T00:00:00Z

Links: CVE-2020-9480 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses