Safety vulnerability ID: 62892
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the Apache Spark package are vulnerable to Improper Input Validation due to insufficient restrictions on classpath configurations. The vulnerability exists because applications can specify arbitrary configuration-related classes on the classpath, circumventing the intended privilege limitations imposed by the 'proxy-user' setting. An attacker can exploit this by submitting a malicious application that includes custom classpath entries, allowing execution of code with the privileges of the submitting user rather than the restricted proxy-user, potentially compromising system security.
Latest version: 4.0.1
Apache Spark Python API
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application