CVE Number – CVE-2018-11770
A vulnerability in Apache Spark running standalone master with the REST API enabled, or running Mesos master with cluster mode enabled, could allow an unauthenticated, remote attacker to perform unauthorized actions on a targeted system.
The vulnerability is due to improper security restrictions imposed by the affected software. Neither the spark.authenticate.secret configuration property nor any other authentication mechanism is used by the affected software when the REST API is enabled. An attacker could exploit this vulnerability to execute a driver program without authentication by using the REST API. A successful exploit could allow the attacker to perform unauthorized actions on the affected application.
Apache has confirmed the vulnerability; however, software updates are not available.
To exploit this vulnerability, the attacker may need access to the trusted internal networks on which the targeted system resides in order to execute a driver program using the REST API. This access requirement may reduce the likelihood of a successful exploit.
Administrators are advised to contact the vendor regarding future updates and releases.
Administrators are advised to allow only trusted users to have network access.
Administrators are advised to run both firewall and antivirus applications to minimize the potential of inbound and outbound threats.
Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
Administrators can help protect affected systems from external attacks by using a solid firewall strategy.
Administrators are advised to monitor affected systems.
Apache has released a security advisory at the following link: CVE-2018-11770
At the time this alert was first published, Apache had not released software updates.