VYPR
Moderate severityNVD Advisory· Published Feb 4, 2019· Updated Sep 16, 2024

CVE-2018-11760

CVE-2018-11760

Description

When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In Apache Spark's PySpark, a local user can connect to the Spark application and impersonate the user running it, affecting versions 1.x through 2.3.1.

Vulnerability

In Apache Spark's PySpark component, a vulnerability exists that allows a different local user to connect to the Spark application and impersonate the user running the Spark application. This issue affects Spark versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1. [1][2]

Exploitation

An attacker with local access to the system where the Spark application is running can connect to the application's process and impersonate the user executing the Spark job. No additional authentication or user interaction is required beyond local system access. [1]

Impact

Successful exploitation allows the attacker to execute arbitrary code or perform actions with the privileges of the Spark application user, potentially leading to privilege escalation, data disclosure, or unauthorized actions within the cluster. [1][2]

Mitigation

The vulnerability is fixed in Spark version 2.3.2 and later. Users should upgrade to a patched version. No workaround is available. Affected users are advised to ensure that local access to the Spark application is restricted to trusted users only. [1][2]

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
pysparkPyPI
>= 2.3.0, < 2.3.22.3.2
pysparkPyPI
>= 1.0.2, < 2.2.32.2.3

Affected products

2
  • ghsa-coords
    Range: >= 2.3.0, < 2.3.2
  • Apache Software Foundation/Apache Sparkv5
    Range: Apache Spark 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.