CVE-2017-12612
HIGHApache Spark < 2.1.2 - Insecure Deserialization
Title source: ruleDescription
In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.2.0 or later.
Scores
CVSS v3
7.8
EPSS
0.0014
EPSS Percentile
34.5%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
draft
Affected Products (12)
apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
org.apache.spark/spark-core_2.11
< 2.1.2Maven
org.apache.spark/spark-core_2.10
< 2.1.2Maven
pypi/pyspark
< 2.1.2PyPI
Timeline
Published
Sep 13, 2017
Tracked Since
Feb 18, 2026