DETECTION OVERVIEW
Risk Factors
This vulnerability is well known, and public exploit code is available. An unauthenticated attacker could gain complete control of a device and find an entry point for further attacks on your network.
Kill Chain
Risk Score
83
Apache Spark is an open-source analytics engine for large-scale data processing. Users can authenticate through the Spark web interface to connect to other servers. To help manage authentication, Spark includes an option, spark.acls.enable, which enables users to configure access control lists (ACLs). When this option is enabled, Spark has a vulnerability that allows an attacker to send malicious commands to connected servers through the Sparks web interface. To exploit this vulnerability, the attacker replaces a username with a malicious command in the query or form parameter, ?doAs=, within an HTTP GET request. The malicious command runs on the connected server.
Upgrade to Apache Spark maintenance release 3.1.3, 3.2.2, 3.3.0, or later