Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <40c34c5a-0bb0-a0ba-a738-b21ab336a194@apache.org>
Date: Sat, 15 Apr 2023 13:24:05 +0000
From: "Sean R. Owen" <srowen@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-22946: Apache Spark proxy-user privilege escalation from
 malicious configuration class 

Description:

In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications.

This issue is being tracked as SPARK-41958 

Work Arounds:

Update to Apache Spark 3.4.0 or later, and ensure that spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its default of "false", and is not overridden by submitted applications.

Credit:

Hideyuki Furue (finder)
Yi Wu (Databricks) (remediation developer)

References:

https://spark.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-22946
https://issues.apache.org/jira/browse/SPARK-41958

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.