Vulnerability Description
When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Spark | >= 1.0.2, <= 1.6.3 |
References
- http://www.securityfocus.com/bid/106786Third Party Advisory
- https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b49938
- https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d2
- http://www.securityfocus.com/bid/106786Third Party Advisory
- https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b49938
- https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d2
FAQ
What is CVE-2018-11760?
CVE-2018-11760 is a vulnerability with a CVSS score of 5.5 (MEDIUM). When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0...
How severe is CVE-2018-11760?
CVE-2018-11760 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11760?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Spark.