Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9rr6-jpg7-9jg6

Опубликовано: 11 мар. 2022
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

Authentication Bypass by Capture-replay in Apache Spark

Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later

Пакеты

Наименование

org.apache.spark:spark-core

maven
Затронутые версииВерсия исправления

< 3.1.3

3.1.3

Наименование

pyspark

pip
Затронутые версииВерсия исправления

< 3.1.3

3.1.3

EPSS

Процентиль: 75%
0.0088
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-294

Связанные уязвимости

CVSS3: 7.5
nvd
почти 4 года назад

Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later

CVSS3: 7.5
debian
почти 4 года назад

Apache Spark supports end-to-end encryption of RPC connections via "sp ...

EPSS

Процентиль: 75%
0.0088
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-294