Apache Spark: Shell command injection via Spark UI
Description
UNSUPPORTED WHEN ASSIGNED The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This issue was disclosed earlier as CVE-2022-33891, but incorrectly claimed version 3.1.3 (which has since gone EOL) would not be affected.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Users are recommended to upgrade to a supported version of Apache Spark, such as version 3.4.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2023-32007: A shell command injection in Apache Spark UI's ACL filter allows unauthenticated impersonation and arbitrary command execution on unsupported versions.
Vulnerability
Overview CVE-2023-32007 is a shell command injection vulnerability in the Apache Spark UI's HTTP security filter (HttpSecurityFilter). When ACLs are enabled via spark.acls.enable, the filter performs user impersonation based on arbitrary user names provided in requests. This impersonation triggers a permission check that constructs and executes a Unix shell command, allowing an attacker to inject arbitrary commands [1][2]. The issue was previously disclosed as CVE-2022-33891 but was incorrectly claimed to not affect version 3.1.3 [4].
Attack
Vector An attacker can exploit this vulnerability by sending crafted HTTP requests to a Spark UI endpoint on an affected cluster (versions 3.1.1 before 3.2.2) where ACLs are enabled. The attacker does not need authentication; they simply supply an arbitrary username to bypass ACL checks, reaching the vulnerable permission function. The function builds a shell command from user input, enabling arbitrary OS command execution as the Spark user [2][4].
Impact
Successful exploitation results in arbitrary shell command execution with the privileges of the Spark process. This can lead to full compromise of the Spark application, including access to data, cluster resources, and potential lateral movement within the network. The vulnerability is rated important and is marked "UNSUPPORTED WHEN ASSIGNED" for affected versions that are no longer supported [2][4].
Mitigation
Users are strongly advised to upgrade to a supported version of Apache Spark (e.g., 3.4.0 or later). For clusters still running affected unsupported versions, disabling ACLs (spark.acls.enable=false) or applying strict network access controls can reduce risk, but upgrading is the only complete fix [1][2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.spark:spark-parent_2.12Maven | >= 3.1.1, < 3.2.2 | 3.2.2 |
pysparkPyPI | >= 3.1.1, < 3.2.2 | 3.2.2 |
Affected products
4- osv-coords3 versions
< 3.0.4+ 2 more
- (no CPE)range: < 3.0.4
- (no CPE)range: >= 3.1.1, < 3.2.2
- (no CPE)range: >= 3.1.1, < 3.2.2
- Apache Software Foundation/Apache Sparkv5Range: 3.1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/advisories/GHSA-59hw-j9g6-mfg3ghsaADVISORY
- lists.apache.org/thread/poxgnxhhnzz735kr1wos366l5vdbb0nvghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-32007ghsaADVISORY
- spark.apache.org/security.htmlghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2023/05/02/1ghsaWEB
- github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-72.yamlghsaWEB
- www.cve.org/CVERecordghsarelatedWEB
- www.openwall.com/lists/oss-security/2023/05/02/1ghsaWEB
News mentions
0No linked articles in our index yet.