CVE-2020-9480
CRITICAL EXPLOITED IN THE WILD NUCLEIApache Spark < 2.4.5 - Missing Authentication
Title source: ruleDescription
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
Exploits (1)
Nuclei Templates (1)
Apache Spark - Authentication Bypass
CRITICALVERIFIEDby riteshs4hu
FOFA:
port="6066" && banner="Spark Master"
References (6)
Scores
CVSS v3
9.8
EPSS
0.9055
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-05-10
InTheWild.io
2024-05-17
CWE
CWE-306
Status
published
Products (4)
apache/spark
< 2.4.5
oracle/business_intelligence
5.5.0.0.0
org.apache.spark/spark-parent_2.11
0 - 2.4.6Maven
pypi/pyspark
0 - 2.4.6PyPI
Published
Jun 23, 2020
Tracked Since
Feb 18, 2026