CVE-2018-1334

Severity
4.7MEDIUM
EPSS
0.1%
top 72.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 12
Latest updateMar 14

Description

In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.

CVSS vector

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 1.0 | Impact: 3.6

Affected Packages5 packages

PyPIpyspark2.2.02.2.2+1
Mavenorg.apache.spark:spark-core_2.101.0.02.1.3+1
Mavenorg.apache.spark:spark-core_2.111.0.02.1.3+2
NVDapache/spark2.2.02.2.1+2
CVEListV5apache_software_foundation/apache_spark1.0.0 to 2.1.2, 2.2.0 to 2.2.1, 2.3.0+2

🔴Vulnerability Details

4
GHSA
Exposure of Sensitive Information to an Unauthorized Actor in Apache Spark2019-03-14
OSV
Exposure of Sensitive Information to an Unauthorized Actor in Apache Spark2019-03-14
CVEList
CVE-2018-1334: In Apache Spark 12018-07-12
OSV
CVE-2018-1334: In Apache Spark 12018-07-12

📋Vendor Advisories

1
Apache
Apache spark: CVE-2018-1334
CVE-2018-1334 (MEDIUM CVSS 4.7) | In Apache Spark 1.0.0 to 2.1.2 | cvebase.io