In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
References
Link | Resource |
---|---|
http://sparkjava.com/news#spark-272-released | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:2020 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2405 | Third Party Advisory |
https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668 | Patch Third Party Advisory |
https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd | Patch Third Party Advisory |
https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc | Patch Third Party Advisory |
https://github.com/perwendel/spark/issues/981 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-03-31 21:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-9159
Mitre link : CVE-2018-9159
CVE.ORG link : CVE-2018-9159
JSON object : View
Products Affected
sparkjava
- spark
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')