Rewterz Threat Advisory – CVE-2021-34538 – Apache Hive Vulnerability
July 20, 2022Rewterz Threat Advisory – CVE-2022-35741 – Apache CloudStack XML Vulnerability
July 20, 2022Rewterz Threat Advisory – CVE-2021-34538 – Apache Hive Vulnerability
July 20, 2022Rewterz Threat Advisory – CVE-2022-35741 – Apache CloudStack XML Vulnerability
July 20, 2022Severity
High
Analysis Summary
CVE-2022-33891
Apache Spark could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by improper input validation of code path in HttpSecurityFilter when ACSs are enabled. By sending a specially-crafted request using arbitrary user name, an attacker could exploit this vulnerability to execute arbitrary shell commands in the context of Spark user.
Impact
- Command Execution
Indicators Of Compromise
CVE
- CVE-2022-33891
Affected Vendors
Apache
Affected Products
- Apache Spark 3.1.2
- Apache Spark 3.0.3
- Apache Spark 3.1.1
- Apache Spark 3.2.0
Remediation
Upgrade to the latest version of Apache Spark, available from the Apache Web site.