Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.spark/spark-core@2.3.1
purl pkg:maven/org.apache.spark/spark-core@2.3.1
Next non-vulnerable version 2.3.2
Latest non-vulnerable version 3.4.0
Risk 3.2
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-h81x-x7wm-fqgx
Aliases:
CVE-2018-11760
GHSA-fvxv-9xxr-h7wj
PYSEC-2019-169
When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.
2.3.2
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-pgne-36yk-37bj Information Exposure In Apache Spark it is possible for a malicious user to construct a URL pointing to a Spark cluster UI job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not. CVE-2018-8024
GHSA-8cw6-5qvp-q3wj
VCID-y6p4-rd9t-cqad In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. CVE-2018-1334
GHSA-6mqq-8r44-vmjc
PYSEC-2018-25