9.8
CVSSv3

CVE-2020-9480

Published: 23/06/2020 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

In Apache Spark 2.4.5 and previous versions, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache spark

oracle business intelligence 5.5.0.0.0

Github Repositories

Tool to pentest spark clusters

Sparky Sparky is a tool to easily abuse and pentest a Spark server in Standalone mode (Some features work on a Yarn cluster as well) The tool was introduced in DEF CON Safemode 2020 Features Get general information about the Spark cluster, from HTTP Web interface, REST API and through internal APIs Spark version Number of workers, CPU cores, memory List of applications Ex