First published: Wed Jul 12 2017(Updated: )
In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Spark | <=2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7678 has a medium severity level due to its potential for cross-site scripting attacks.
To fix CVE-2017-7678, upgrade Apache Spark to version 2.2.0 or later where the vulnerability is addressed.
CVE-2017-7678 allows attackers to submit arbitrary data, including scripts, to the Spark master or history server.
CVE-2017-7678 affects versions of Apache Spark below 2.2.0.
Yes, CVE-2017-7678 can be exploited remotely if a user is tricked into clicking a malicious link.