CVE-2017-12612

HIGH

Apache Spark < 2.1.2 - Insecure Deserialization

Title source: rule

Description

In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.2.0 or later.

Scores

CVSS v3 7.8
EPSS 0.0014
EPSS Percentile 34.5%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502
Status draft

Affected Products (12)

apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
apache/spark
org.apache.spark/spark-core_2.11 < 2.1.2Maven
org.apache.spark/spark-core_2.10 < 2.1.2Maven
pypi/pyspark < 2.1.2PyPI

Timeline

Published Sep 13, 2017
Tracked Since Feb 18, 2026