VYPR
Critical severityNVD Advisory· Published Jun 23, 2020· Updated Aug 4, 2024

CVE-2020-9480

CVE-2020-9480

Description

In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Spark 2.4.5 and earlier allow authentication bypass in the standalone resource manager master, enabling remote code execution.

In Apache Spark 2.4.5 and earlier, the standalone resource manager's master supports optional authentication (spark.authenticate) via a shared secret. A flaw in the RPC handling allows a specially-crafted request to succeed in starting application resources even without the correct shared key. This is a missing authentication check for RPCs that should require the shared secret.

To exploit this, an attacker must be able to send RPCs to the Spark master's port. No prior authentication is needed. The attack does not require any user interaction and can be performed remotely if the master endpoint is accessible. This vulnerability only affects clusters using the standalone resource manager; clusters using YARN, Mesos, or Kubernetes are not impacted.

A successful attack allows the attacker to start a Spark application on the cluster. Because Spark applications are designed to execute arbitrary code on the workers, this results in remote code execution on the host machines. An attacker can run shell commands, access local files, and establish network connections from the compromised worker node.

The Apache Spark project has addressed this issue in Spark 2.4.6 by enforcing authentication checks for the vulnerable RPCs [1]. Users should upgrade to Spark 2.4.6 or later. As a workaround, users of earlier versions can restrict network access to the master endpoint to trusted networks only [1]. The vulnerability is also tracked in the PyPA advisory database for PySpark [3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.spark:spark-parent_2.11Maven
< 2.4.62.4.6
pysparkPyPI
< 2.4.62.4.6

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

13

News mentions

0

No linked articles in our index yet.