In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications.
Update to Apache Spark 3.4.0 or later, and ensure that
spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its
default of "false", and is not overridden by submitted applications.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/yllfl25xh5tbotjmg93zrq4bzwhqc0gv | Mailing List Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-04-17 08:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-22946
Mitre link : CVE-2023-22946
CVE.ORG link : CVE-2023-22946
JSON object : View
Products Affected
apache
- spark
CWE
CWE-269
Improper Privilege Management