A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI.
CVE-2022-31777 - Medium Severity Vulnerability
Vulnerable Library - spark-core_2.11-2.2.0.cloudera1.jar
Path to vulnerable library: /vy2/cache/org.apache.spark/spark-core_2.11/jars/spark-core_2.11-2.2.0.cloudera1.jar
Dependency Hierarchy: - :x: **spark-core_2.11-2.2.0.cloudera1.jar** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI.
Publish Date: 2022-11-01
URL: CVE-2022-31777
CVSS 3 Score Details (5.4)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/60mgbswq2lsmrxykfxpqq13ztkm2ht6q
Release Date: 2022-11-01
Fix Resolution: org.apache.spark:spark-core:3.2.2,3.3.1
Step up your Open Source Security Game with Mend here