We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-22946

Apache Spark proxy-user privilege escalation from malicious configuration class



Assignerapache
Reserved2023-01-11
Published2023-04-17
Updated2024-10-21

Description

In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications. Update to Apache Spark 3.4.0 or later, and ensure that spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its default of "false", and is not overridden by submitted applications.



MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Product status

Default status
unaffected

Any version before 3.4.0
affected

Credits

Hideyuki Furue finder

Yi Wu (Databricks) remediation developer

References

https://lists.apache.org/thread/yllfl25xh5tbotjmg93zrq4bzwhqc0gv vendor-advisory

cve.org CVE-2023-22946

nvd.nist.gov CVE-2023-22946

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.