Search for vulnerabilities
Vulnerability details: VCID-9y9x-pmqr-zyfq
Vulnerability ID VCID-9y9x-pmqr-zyfq
Aliases BIT-spark-2023-32007
CVE-2023-32007
GHSA-59hw-j9g6-mfg3
PYSEC-2023-72
Summary Apache Spark UI vulnerable to Command Injection The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This issue was disclosed earlier as CVE-2022-33891, but incorrectly claimed version 3.1.3 (which has since gone EOL) would not be affected. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Users are recommended to upgrade to a supported version of Apache Spark, such as version 3.4.0.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.90776 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
epss 0.91155 https://api.first.org/data/v1/epss?cve=CVE-2023-32007
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-59hw-j9g6-mfg3
cvssv3.1 8.8 https://github.com/apache/spark
generic_textual HIGH https://github.com/apache/spark
cvssv3.1 8.8 https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml
cvssv3.1 8.8 https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
generic_textual HIGH https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
ssvc Track https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-32007
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-32007
cvssv3.1 8.8 https://spark.apache.org/security.html
generic_textual HIGH https://spark.apache.org/security.html
ssvc Track https://spark.apache.org/security.html
cvssv3.1 8.8 https://www.cve.org/CVERecord?id=CVE-2022-33891
generic_textual HIGH https://www.cve.org/CVERecord?id=CVE-2022-33891
ssvc Track https://www.cve.org/CVERecord?id=CVE-2022-33891
cvssv3.1 8.8 https://www.openwall.com/lists/oss-security/2023/05/02/1
generic_textual HIGH https://www.openwall.com/lists/oss-security/2023/05/02/1
cvssv3.1 8.8 http://www.openwall.com/lists/oss-security/2023/05/02/1
generic_textual HIGH http://www.openwall.com/lists/oss-security/2023/05/02/1
ssvc Track http://www.openwall.com/lists/oss-security/2023/05/02/1
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/apache/spark
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:07:28Z/ Found at https://lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nv
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-32007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://spark.apache.org/security.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:07:28Z/ Found at https://spark.apache.org/security.html
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://www.cve.org/CVERecord?id=CVE-2022-33891
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:07:28Z/ Found at https://www.cve.org/CVERecord?id=CVE-2022-33891
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://www.openwall.com/lists/oss-security/2023/05/02/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at http://www.openwall.com/lists/oss-security/2023/05/02/1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:07:28Z/ Found at http://www.openwall.com/lists/oss-security/2023/05/02/1
Exploit Prediction Scoring System (EPSS)
Percentile 0.99594
EPSS Score 0.90776
Published At June 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-01T12:16:09.382240+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-59hw-j9g6-mfg3/GHSA-59hw-j9g6-mfg3.json 36.1.3