[ 
https://issues.apache.org/jira/browse/SPARK-52122?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Weichen Xu reassigned SPARK-52122:
----------------------------------

    Assignee: Weichen Xu

> Fix DefaultParamsReader RCE vulnerability
> -----------------------------------------
>
>                 Key: SPARK-52122
>                 URL: https://issues.apache.org/jira/browse/SPARK-52122
>             Project: Spark
>          Issue Type: Sub-task
>          Components: Connect, ML
>    Affects Versions: 4.1.0
>            Reporter: Weichen Xu
>            Assignee: Weichen Xu
>            Priority: Major
>
> Fix DefaultParamsReader RCE vulnerability:
> The metadata loading 
> [https://github.com/apache/spark/blob/18aebd8eb86b554e7aab38baca1e5de24df19a57/mllib/src/main/scala/org/apache/spark/ml/util/ReadWrite.scala#L565]
>  does not verify the class,
> and then the reflection invocation 
> [https://github.com/apache/spark/blob/18aebd8eb86b554e7aab38baca1e5de24df19a57/mllib/src/main/scala/org/apache/spark/ml/util/ReadWrite.scala#L568]
>  will trigger arbitrary code execution if malicious class name is written to 
> a designed metadata file.
>  
> This become a security vulnerability because the code is executed in Spark 
> driver which might be run as ROOT permission.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org
For additional commands, e-mail: issues-h...@spark.apache.org

Reply via email to