Lookup for vulnerable packages by Package URL.

GET /api/packages/181011?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/181011?format=api",
    "purl": "pkg:maven/org.apache.spark/spark-core_2.11@2.4.1",
    "type": "maven",
    "namespace": "org.apache.spark",
    "name": "spark-core_2.11",
    "version": "2.4.1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/22590?format=api",
            "vulnerability_id": "VCID-1gtx-thb1-9ud6",
            "summary": "Apache Spark: Spark History Server Code Execution Vulnerability\nThis issue affects Apache Spark: before 3.5.7 and 4.0.1. Users are recommended to upgrade to version 3.5.7 or 4.0.1 and above, which fixes the issue.\n\n## Summary\n\nApache Spark 3.5.4 and earlier versions contain a code execution vulnerability in the Spark History Web UI due to overly permissive Jackson deserialization of event log data. This allows an attacker with access to the Spark event logs directory to inject malicious JSON payloads that trigger deserialization of arbitrary classes, enabling command execution on the host running the Spark History Server.\n\n## Details\n\nThe vulnerability arises because the Spark History Server uses Jackson polymorphic deserialization with @JsonTypeInfo.Id.CLASS on SparkListenerEvent objects, allowing an attacker to specify arbitrary class names in the event JSON. This behavior permits instantiating unintended classes, such as org.apache.hive.jdbc.HiveConnection, which can perform network calls or other malicious actions during deserialization.\n\nThe attacker can exploit this by injecting crafted JSON content into the Spark event log files, which the History Server then deserializes on startup or when loading event logs. For example, the attacker can force the History Server to open a JDBC connection to a remote attacker-controlled server, demonstrating remote command injection capability.\n\n## Proof of Concept:\n\n1. Run Spark with event logging enabled, writing to a writable directory (spark-logs).\n\n2. Inject the following JSON at the beginning of an event log file:\n\n```\n{\n\n  \"Event\": \"org.apache.hive.jdbc.HiveConnection\",\n  \"uri\": \"jdbc:hive2://<IP>:<PORT>/\",\n  \"info\": {\n    \"hive.metastore.uris\": \"thrift://<IP>:<PORT>\"\n  }\n}\n```\n3. Start the Spark History Server with logs pointing to the modified directory.\n\n4. The Spark History Server initiates a JDBC connection to the attacker’s server, confirming the injection.\n\n## Impact\n\nAn attacker with write access to Spark event logs can execute arbitrary code on the server running the History Server, potentially compromising the entire system.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54920.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54920.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00498",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65871",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00498",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65841",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00498",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65837",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67637",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6766",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67662",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71428",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71395",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71412",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71405",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71392",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72489",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72478",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7248",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00718",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7252",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-54920"
                },
                {
                    "reference_url": "https://github.com/apache/spark",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/spark"
                },
                {
                    "reference_url": "https://github.com/apache/spark/pull/51312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://github.com/apache/spark/pull/51312"
                },
                {
                    "reference_url": "https://github.com/apache/spark/pull/51323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://github.com/apache/spark/pull/51323"
                },
                {
                    "reference_url": "https://issues.apache.org/jira/browse/SPARK-52381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://issues.apache.org/jira/browse/SPARK-52381"
                },
                {
                    "reference_url": "https://lists.apache.org/thread/4y9n0nfj7m68o2hpmoxgc0y7dm1lo02s",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread/4y9n0nfj7m68o2hpmoxgc0y7dm1lo02s"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54920",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54920"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2026/03/13/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2026/03/13/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447599",
                    "reference_id": "2447599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2447599"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jwp6-cvj8-fw65",
                    "reference_id": "GHSA-jwp6-cvj8-fw65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jwp6-cvj8-fw65"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2025-54920",
                "GHSA-jwp6-cvj8-fw65"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1gtx-thb1-9ud6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10071?format=api",
            "vulnerability_id": "VCID-as3y-ffvw-rube",
            "summary": "Improper Authentication\nIn all versions of Apache Spark, the standalone resource manager accepts code to execute on a `master` host, that then runs that code on `worker` hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17190",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79078",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78945",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78972",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78956",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78981",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78987",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79011",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78996",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78986",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79014",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7901",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79044",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7905",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79065",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78939",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-17190"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-21",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-21"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/105976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/105976"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17190",
                    "reference_id": "CVE-2018-17190",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17190"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-phg2-9c5g-m4q7",
                    "reference_id": "GHSA-phg2-9c5g-m4q7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-phg2-9c5g-m4q7"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2018-17190",
                "GHSA-phg2-9c5g-m4q7"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-as3y-ffvw-rube"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.11@2.4.1"
}