Weichen Xu created SPARK-52122:
----------------------------------

             Summary: Fix DefaultParamsReader RCE vulnerability
                 Key: SPARK-52122
                 URL: https://issues.apache.org/jira/browse/SPARK-52122
             Project: Spark
          Issue Type: Sub-task
          Components: Connect, ML
    Affects Versions: 4.1.0
            Reporter: Weichen Xu


Fix DefaultParamsReader RCE vulnerability:

The metadata loading 
[https://github.com/apache/spark/blob/18aebd8eb86b554e7aab38baca1e5de24df19a57/mllib/src/main/scala/org/apache/spark/ml/util/ReadWrite.scala#L565]
 does not verify the class,

and then the reflection invocation 
[https://github.com/apache/spark/blob/18aebd8eb86b554e7aab38baca1e5de24df19a57/mllib/src/main/scala/org/apache/spark/ml/util/ReadWrite.scala#L568]
 will trigger arbitrary code execution if malicious class name is written to a 
designed metadata file.

 

This become a security vulnerability because the code is executed in Spark 
driver which might be run as ROOT permission.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org
For additional commands, e-mail: issues-h...@spark.apache.org

Reply via email to