Apache Livy: Restrict file access
Description
Malicious configuration can lead to unauthorized file access in Apache Livy.
This issue affects Apache Livy 0.7.0 and 0.8.0 when connecting to Apache Spark 3.1 or later.
A request that includes a Spark configuration value supported from Apache Spark version 3.1 can lead to users gaining access to files they do not have permissions to.
For the vulnerability to be exploitable, the user needs to have access to Apache Livy's REST or JDBC interface and be able to send requests with arbitrary Spark configuration values.
Users are recommended to upgrade to version 0.9.0 or later, which fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Livy 0.7.0 and 0.8.0 allow unauthorized file access via malicious Spark configuration values when connecting to Spark 3.1+.
Vulnerability
Description
Apache Livy versions 0.7.0 and 0.8.0 contain a vulnerability that allows unauthorized file access when connecting to Apache Spark 3.1 or later [1]. The root cause is that Livy does not properly validate Spark configuration values provided by users in requests. A malicious configuration value, supported from Spark 3.1 onward, can be used to read files on the server that the user should not have access to [3].
Exploitation
Prerequisites
An attacker must have access to Apache Livy's REST or JDBC interface and be able to send requests with arbitrary Spark configuration values [1]. No additional authentication is mentioned, but the attacker needs network access to the Livy endpoint. The vulnerability is exploitable without prior authentication if the interface is exposed.
Impact
Successful exploitation allows an attacker to read arbitrary files on the Livy server that the Livy process has access to, potentially exposing sensitive data such as configuration files, credentials, or application data [3].
Mitigation
Users should upgrade to Apache Livy version 0.9.0 or later, which fixes the issue [1]. No workarounds are documented. The vulnerability affects only Livy 0.7.0 and 0.8.0 when used with Spark 3.1+.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.livy:livy-serverMaven | >= 0.7.0-incubating, < 0.9.0-incubating | 0.9.0-incubating |
Affected products
3- Apache Software Foundation/Apache Livyv5Range: 0.7.0-incubating
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-hm8x-rpgg-7855ghsaADVISORY
- lists.apache.org/thread/gpc85fwrgrbglpk9gm8tmcjzqnctx64wghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-60012ghsaADVISORY
- www.openwall.com/lists/oss-security/2026/03/12/1ghsaWEB
News mentions
0No linked articles in our index yet.