We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-22946

Apache Spark proxy-user privilege escalation from malicious configuration class



Description

In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications. Update to Apache Spark 3.4.0 or later, and ensure that spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its default of "false", and is not overridden by submitted applications.

Reserved 2023-01-11 | Published 2023-04-17 | Updated 2024-10-21 | Assigner apache


MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-269 Improper Privilege Management

Product status

Default status
unaffected

Any version before 3.4.0
affected

Credits

Hideyuki Furue finder

Yi Wu (Databricks) remediation developer

References

lists.apache.org/thread/yllfl25xh5tbotjmg93zrq4bzwhqc0gv vendor-advisory

cve.org (CVE-2023-22946)

nvd.nist.gov (CVE-2023-22946)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-22946

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.