logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2020-9480

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2020-9480

Description:
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
Last updated date:
04/26/2022

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
05/17/2024
Reference url to background

https://1665891.fs1.hubspotusercontent-na1.net/hubfs/1665891/Threat%20reports/AquaSecurity_Kinsing_Demystified_Technical_Guide.pdf

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy