Search for vulnerabilities
Vulnerability details: VCID-2vzj-x4mg-aaan
Vulnerability ID VCID-2vzj-x4mg-aaan
Aliases BIT-2023-32007
BIT-spark-2023-32007
CVE-2023-32007
GHSA-59hw-j9g6-mfg3
PYSEC-0000-CVE-2023-32007
PYSEC-2023-72
Summary Apache Spark UI vulnerable to Command Injection
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.00938 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.00969 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.00969 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.00969 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.00969 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01005 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01005 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01005 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01161 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01212 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01212 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01269 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01269 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01269 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.01269 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.91155 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.91155 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.91155 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.91155 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.92579 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.92579 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.92579 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.92579 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.92579 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.92579 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-59hw-j9g6-mfg3
cvssv3.1 8.8 https://github.com/apache/spark
generic_textual HIGH https://github.com/apache/spark
cvssv3.1 8.8 https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml
cvssv3.1 8.8 https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
generic_textual HIGH https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-32007
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-32007
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-32007
cvssv3.1 8.8 https://spark.apache.org/security.html
generic_textual HIGH https://spark.apache.org/security.html
cvssv3.1 8.8 https://www.cve.org/CVERecord?id=CVE-2022-33891
generic_textual HIGH https://www.cve.org/CVERecord?id=CVE-2022-33891
cvssv3.1 8.8 https://www.openwall.com/lists/oss-security/2023/05/02/1
generic_textual HIGH https://www.openwall.com/lists/oss-security/2023/05/02/1
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2023/05/02/1
generic_textual HIGH http://www.openwall.com/lists/oss-security/2023/05/02/1
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/apache/spark
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-32007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-32007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://spark.apache.org/security.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://www.cve.org/CVERecord?id=CVE-2022-33891
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://www.openwall.com/lists/oss-security/2023/05/02/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2023/05/02/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.82988
EPSS Score 0.00938
Published At Jan. 16, 2025, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.