Description
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0533 | In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark. |
Github GHSA |
GHSA-76qr-mmh8-cp8f | Moderate severity vulnerability that affects com.sparkjava:spark-core |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:17:51.328Z
Reserved: 2018-03-31T00:00:00.000Z
Link: CVE-2018-9159
No data.
Status : Modified
Published: 2018-03-31T21:29:00.373
Modified: 2024-11-21T04:15:06.177
Link: CVE-2018-9159
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA