[jira] [Commented] (SPARK-38631) Arbitrary shell command injection via Utils.unpack()
[ https://issues.apache.org/jira/browse/SPARK-38631?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17512297#comment-17512297 ] Hyukjin Kwon commented on SPARK-38631: -- Thanks for pointing this out, [~Qin Yao] > Arbitrary shell command injection via Utils.unpack() > > > Key: SPARK-38631 > URL: https://issues.apache.org/jira/browse/SPARK-38631 > Project: Spark > Issue Type: Bug > Components: Spark Core >Affects Versions: 3.1.2, 3.2.1, 3.3.0 >Reporter: Hyukjin Kwon >Assignee: Hyukjin Kwon >Priority: Critical > Fix For: 3.1.3, 3.3.0, 3.2.2 > > > There is a risk for arbitrary shell command injection via {{Utils.unpack}} > when the filename is controlled by a malicious user. This is due to an issue > in Hadoop's {{unTar}}, that is not properly escaping the filename before > passing to a shell > command:https://github.com/apache/hadoop/blob/trunk/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/FileUtil.java#L904 -- This message was sent by Atlassian Jira (v8.20.1#820001) - To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org For additional commands, e-mail: issues-h...@spark.apache.org
[jira] [Commented] (SPARK-38631) Arbitrary shell command injection via Utils.unpack()
[ https://issues.apache.org/jira/browse/SPARK-38631?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17512296#comment-17512296 ] Kent Yao commented on SPARK-38631: -- [~hyukjin.kwon] Hi, shall we update the fixed versions? > Arbitrary shell command injection via Utils.unpack() > > > Key: SPARK-38631 > URL: https://issues.apache.org/jira/browse/SPARK-38631 > Project: Spark > Issue Type: Bug > Components: Spark Core >Affects Versions: 3.1.2, 3.2.1, 3.3.0 >Reporter: Hyukjin Kwon >Assignee: Hyukjin Kwon >Priority: Critical > > There is a risk for arbitrary shell command injection via {{Utils.unpack}} > when the filename is controlled by a malicious user. This is due to an issue > in Hadoop's {{unTar}}, that is not properly escaping the filename before > passing to a shell > command:https://github.com/apache/hadoop/blob/trunk/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/FileUtil.java#L904 -- This message was sent by Atlassian Jira (v8.20.1#820001) - To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org For additional commands, e-mail: issues-h...@spark.apache.org
[jira] [Commented] (SPARK-38631) Arbitrary shell command injection via Utils.unpack()
[ https://issues.apache.org/jira/browse/SPARK-38631?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17511005#comment-17511005 ] Apache Spark commented on SPARK-38631: -- User 'HyukjinKwon' has created a pull request for this issue: https://github.com/apache/spark/pull/35946 > Arbitrary shell command injection via Utils.unpack() > > > Key: SPARK-38631 > URL: https://issues.apache.org/jira/browse/SPARK-38631 > Project: Spark > Issue Type: Bug > Components: Spark Core >Affects Versions: 3.1.2, 3.2.1, 3.3.0 >Reporter: Hyukjin Kwon >Priority: Critical > > There is a risk for arbitrary shell command injection via {{Utils.unpack}} > when the filename is controlled by a malicious user. This is due to an issue > in Hadoop's {{unTar}}, that is not properly escaping the filename before > passing to a shell > command:https://github.com/apache/hadoop/blob/trunk/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/FileUtil.java#L904 -- This message was sent by Atlassian Jira (v8.20.1#820001) - To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org For additional commands, e-mail: issues-h...@spark.apache.org
[jira] [Commented] (SPARK-38631) Arbitrary shell command injection via Utils.unpack()
[ https://issues.apache.org/jira/browse/SPARK-38631?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17511003#comment-17511003 ] Apache Spark commented on SPARK-38631: -- User 'HyukjinKwon' has created a pull request for this issue: https://github.com/apache/spark/pull/35946 > Arbitrary shell command injection via Utils.unpack() > > > Key: SPARK-38631 > URL: https://issues.apache.org/jira/browse/SPARK-38631 > Project: Spark > Issue Type: Bug > Components: Spark Core >Affects Versions: 3.1.2, 3.2.1, 3.3.0 >Reporter: Hyukjin Kwon >Priority: Critical > > There is a risk for arbitrary shell command injection via {{Utils.unpack}} > when the filename is controlled by a malicious user. This is due to an issue > in Hadoop's {{unTar}}, that is not properly escaping the filename before > passing to a shell > command:https://github.com/apache/hadoop/blob/trunk/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/FileUtil.java#L904 -- This message was sent by Atlassian Jira (v8.20.1#820001) - To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org For additional commands, e-mail: issues-h...@spark.apache.org