Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.spark/spark-core@3.1.3
Typemaven
Namespaceorg.apache.spark
Namespark-core
Version3.1.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.2.2
Latest_non_vulnerable_version3.4.0
Affected_by_vulnerabilities
0
url VCID-5uaa-p1dd-3yb3
vulnerability_id VCID-5uaa-p1dd-3yb3
summary
** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This issue was disclosed earlier as CVE-2022-33891, but incorrectly claimed version 3.1.3 (which has since gone EOL) would not be affected.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Users are recommended to upgrade to a supported version of Apache Spark, such as version 3.4.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32007
reference_id
reference_type
scores
0
value 0.92167
scoring_system epss
scoring_elements 0.99707
published_at 2026-04-02T12:55:00Z
1
value 0.92167
scoring_system epss
scoring_elements 0.99711
published_at 2026-04-13T12:55:00Z
2
value 0.92167
scoring_system epss
scoring_elements 0.9971
published_at 2026-04-09T12:55:00Z
3
value 0.92167
scoring_system epss
scoring_elements 0.99708
published_at 2026-04-04T12:55:00Z
4
value 0.92167
scoring_system epss
scoring_elements 0.99715
published_at 2026-04-21T12:55:00Z
5
value 0.92167
scoring_system epss
scoring_elements 0.99712
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32007
1
reference_url https://github.com/apache/spark
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/spark
2
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml
3
reference_url https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:07:28Z/
url https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
4
reference_url https://spark.apache.org/security.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:07:28Z/
url https://spark.apache.org/security.html
5
reference_url https://www.cve.org/CVERecord?id=CVE-2022-33891
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:07:28Z/
url https://www.cve.org/CVERecord?id=CVE-2022-33891
6
reference_url https://www.openwall.com/lists/oss-security/2023/05/02/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.openwall.com/lists/oss-security/2023/05/02/1
7
reference_url http://www.openwall.com/lists/oss-security/2023/05/02/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:07:28Z/
url http://www.openwall.com/lists/oss-security/2023/05/02/1
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32007
reference_id CVE-2023-32007
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-32007
9
reference_url https://github.com/advisories/GHSA-59hw-j9g6-mfg3
reference_id GHSA-59hw-j9g6-mfg3
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-59hw-j9g6-mfg3
fixed_packages
aliases BIT-spark-2023-32007, CVE-2023-32007, GHSA-59hw-j9g6-mfg3, PYSEC-2023-72
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5uaa-p1dd-3yb3
Fixing_vulnerabilities
0
url VCID-aehs-6sa9-a3es
vulnerability_id VCID-aehs-6sa9-a3es
summary Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38296
reference_id
reference_type
scores
0
value 0.00854
scoring_system epss
scoring_elements 0.74983
published_at 2026-04-18T12:55:00Z
1
value 0.00854
scoring_system epss
scoring_elements 0.74975
published_at 2026-04-21T12:55:00Z
2
value 0.00854
scoring_system epss
scoring_elements 0.74898
published_at 2026-04-01T12:55:00Z
3
value 0.00854
scoring_system epss
scoring_elements 0.74899
published_at 2026-04-02T12:55:00Z
4
value 0.00854
scoring_system epss
scoring_elements 0.74928
published_at 2026-04-04T12:55:00Z
5
value 0.00854
scoring_system epss
scoring_elements 0.74901
published_at 2026-04-07T12:55:00Z
6
value 0.00854
scoring_system epss
scoring_elements 0.74935
published_at 2026-04-08T12:55:00Z
7
value 0.00854
scoring_system epss
scoring_elements 0.74947
published_at 2026-04-09T12:55:00Z
8
value 0.00854
scoring_system epss
scoring_elements 0.7497
published_at 2026-04-11T12:55:00Z
9
value 0.00854
scoring_system epss
scoring_elements 0.74948
published_at 2026-04-12T12:55:00Z
10
value 0.00854
scoring_system epss
scoring_elements 0.74939
published_at 2026-04-13T12:55:00Z
11
value 0.00854
scoring_system epss
scoring_elements 0.74976
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38296
1
reference_url https://github.com/advisories/GHSA-9rr6-jpg7-9jg6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-9rr6-jpg7-9jg6
2
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-186.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-186.yaml
3
reference_url https://lists.apache.org/thread/70x8fw2gx3g9ty7yk0f2f1dlpqml2smd
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread/70x8fw2gx3g9ty7yk0f2f1dlpqml2smd
4
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-38296
reference_id CVE-2021-38296
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-38296
fixed_packages
0
url pkg:maven/org.apache.spark/spark-core@3.1.3
purl pkg:maven/org.apache.spark/spark-core@3.1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5uaa-p1dd-3yb3
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core@3.1.3
aliases BIT-spark-2021-38296, CVE-2021-38296, GHSA-9rr6-jpg7-9jg6, PYSEC-2022-186
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aehs-6sa9-a3es
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core@3.1.3