In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
References
Configurations
History
21 Nov 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://sparkjava.com/news#spark-272-released - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2020 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2405 - Third Party Advisory | |
References | () https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668 - Patch, Third Party Advisory | |
References | () https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd - Patch, Third Party Advisory | |
References | () https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc - Patch, Third Party Advisory | |
References | () https://github.com/perwendel/spark/issues/981 - Issue Tracking, Third Party Advisory |
Information
Published : 2018-03-31 21:29
Updated : 2024-11-21 04:15
NVD link : CVE-2018-9159
Mitre link : CVE-2018-9159
CVE.ORG link : CVE-2018-9159
JSON object : View
Products Affected
sparkjava
- spark
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')