Authentication Bypass by Capture-replay in Apache Spark
High severity
GitHub Reviewed
Published
Mar 11, 2022
to the GitHub Advisory Database
•
Updated Oct 25, 2024
Description
Published by the National Vulnerability Database
Mar 10, 2022
Published to the GitHub Advisory Database
Mar 11, 2022
Reviewed
Mar 11, 2022
Last updated
Oct 25, 2024
Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later
References