CVE-2018-9159
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
31/03/2018
Last modified:
03/10/2019
Description
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sparkjava:spark:*:*:*:*:*:*:*:* | 2.7.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://sparkjava.com/news#spark-272-released
- https://access.redhat.com/errata/RHSA-2018:2020
- https://access.redhat.com/errata/RHSA-2018:2405
- https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668
- https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd
- https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc
- https://github.com/perwendel/spark/issues/981



