CVE-2022-33891

Apache Spark shell command injection vulnerability via Spark UI

Basic Information

CVE State
PUBLISHED
Reserved Date
June 17, 2022
Published Date
July 18, 2022
Last Updated
February 04, 2025
Vendor
Apache Software Foundation
Product
Apache Spark
Description
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.

CVSS Scores

CVSS v3.1

8.8 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2023-03-07 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2022-07-20 05:15:28 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-03-07 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

apache_spark_rce_cve_2022_33891

Type: metasploit • Created: Unknown

Metasploit module for CVE-2022-33891

AmoloHT/CVE-2022-33891

Type: github • Created: 2022-07-30 23:02:16 UTC • Stars: 26

「💥」CVE-2022-33891 - Apache Spark Command Injection

nanaao/CVE-2022-33891

Type: github • Created: 2022-07-20 05:15:28 UTC • Stars: 0

PoC for CVE-2022-33891