DNA View

CVE-2017-7678

Low
Low Medium High Critical
CVSS Score
Published: Jul 12, 2017
Last Modified: Apr 20, 2025

Vulnerability Description

In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.

Known Affected Software

39 configuration(s) from 1 vendor(s)

spark
Version:
1.1.0
CPE:
cpe:2.3:a:apache:spark:1.1.0:*:*:*:*:*:*:*
spark
Version:
0.7.0
CPE:
cpe:2.3:a:apache:spark:0.7.0:*:*:*:*:*:*:*
spark
Version:
1.3.0
CPE:
cpe:2.3:a:apache:spark:1.3.0:*:*:*:*:*:*:*
spark
Version:
1.5.1
CPE:
cpe:2.3:a:apache:spark:1.5.1:*:*:*:*:*:*:*
spark
Version:
2.0.0
CPE:
cpe:2.3:a:apache:spark:2.0.0:*:*:*:*:*:*:*
spark
Version:
0.5.0
CPE:
cpe:2.3:a:apache:spark:0.5.0:*:*:*:*:*:*:*
spark
Version:
1.6.2
CPE:
cpe:2.3:a:apache:spark:1.6.2:*:*:*:*:*:*:*
spark
Version:
0.7.3
CPE:
cpe:2.3:a:apache:spark:0.7.3:*:*:*:*:*:*:*
spark
Version:
1.2.0
CPE:
cpe:2.3:a:apache:spark:1.2.0:*:*:*:*:*:*:*
spark
Version:
1.6.3
CPE:
cpe:2.3:a:apache:spark:1.6.3:*:*:*:*:*:*:*
spark
Version:
0.5.2
CPE:
cpe:2.3:a:apache:spark:0.5.2:*:*:*:*:*:*:*
spark
Version:
0.2
CPE:
cpe:2.3:a:apache:spark:0.2:alpha:*:*:*:*:*:*
spark
Version:
0.9.2
CPE:
cpe:2.3:a:apache:spark:0.9.2:*:*:*:*:*:*:*
spark
Version:
0.6.2
CPE:
cpe:2.3:a:apache:spark:0.6.2:*:*:*:*:*:*:*
spark
Version:
2.0.2
CPE:
cpe:2.3:a:apache:spark:2.0.2:*:*:*:*:*:*:*
spark
Version:
0.8.1
CPE:
cpe:2.3:a:apache:spark:0.8.1:*:*:*:*:*:*:*
spark
Version:
0.6.0
CPE:
cpe:2.3:a:apache:spark:0.6.0:*:*:*:*:*:*:*
spark
Version:
1.4.1
CPE:
cpe:2.3:a:apache:spark:1.4.1:*:*:*:*:*:*:*
spark
Version:
1.5.0
CPE:
cpe:2.3:a:apache:spark:1.5.0:*:*:*:*:*:*:*
spark
Version:
1.0.0
CPE:
cpe:2.3:a:apache:spark:1.0.0:*:*:*:*:*:*:*
spark
Version:
1.0.1
CPE:
cpe:2.3:a:apache:spark:1.0.1:*:*:*:*:*:*:*
spark
Version:
0.9.1
CPE:
cpe:2.3:a:apache:spark:0.9.1:*:*:*:*:*:*:*
spark
Version:
1.3.1
CPE:
cpe:2.3:a:apache:spark:1.3.1:*:*:*:*:*:*:*
spark
Version:
1.2.2
CPE:
cpe:2.3:a:apache:spark:1.2.2:*:*:*:*:*:*:*
spark
Version:
2.0.1
CPE:
cpe:2.3:a:apache:spark:2.0.1:*:*:*:*:*:*:*
spark
Version:
1.1.1
CPE:
cpe:2.3:a:apache:spark:1.1.1:*:*:*:*:*:*:*
spark
Version:
1.2.1
CPE:
cpe:2.3:a:apache:spark:1.2.1:*:*:*:*:*:*:*
spark
Version:
1.6.0
CPE:
cpe:2.3:a:apache:spark:1.6.0:*:*:*:*:*:*:*
spark
Version:
0.6.1
CPE:
cpe:2.3:a:apache:spark:0.6.1:*:*:*:*:*:*:*
spark
Version:
1.0.2
CPE:
cpe:2.3:a:apache:spark:1.0.2:*:*:*:*:*:*:*
spark
Version:
1.6.1
CPE:
cpe:2.3:a:apache:spark:1.6.1:*:*:*:*:*:*:*
spark
Version:
1.4.0
CPE:
cpe:2.3:a:apache:spark:1.4.0:*:*:*:*:*:*:*
spark
Version:
0.7.1
CPE:
cpe:2.3:a:apache:spark:0.7.1:*:*:*:*:*:*:*
spark
Version:
1.5.2
CPE:
cpe:2.3:a:apache:spark:1.5.2:*:*:*:*:*:*:*
spark
Version:
0.5.1
CPE:
cpe:2.3:a:apache:spark:0.5.1:*:*:*:*:*:*:*
spark
Version:
2.1.1
CPE:
cpe:2.3:a:apache:spark:2.1.1:*:*:*:*:*:*:*
spark
Version:
0.1
CPE:
cpe:2.3:a:apache:spark:0.1:alpha:*:*:*:*:*:*
spark
Version:
2.1.0
CPE:
cpe:2.3:a:apache:spark:2.1.0:*:*:*:*:*:*:*
spark
Version:
0.7.2
CPE:
cpe:2.3:a:apache:spark:0.7.2:*:*:*:*:*:*:*
This vulnerability affects 39 software configuration(s). Ensure you patch all affected systems.

Severity Details

out of 10.0
Low

Weakness Type (CWE)

CWE-79 Top 25 #1

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Description
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Exploit Likelihood
High
Typical Severity
Medium
OWASP Top 10
A03:2021-Injection
Abstraction Level
Base

Key Information

Published Date
July 12, 2017