[jira] [Commented] (SPARK-38631) Arbitrary shell command injection via Utils.unpack()

2022-03-25 Thread Hyukjin Kwon (Jira)


[ 
https://issues.apache.org/jira/browse/SPARK-38631?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17512297#comment-17512297
 ] 

Hyukjin Kwon commented on SPARK-38631:
--

Thanks for pointing this out, [~Qin Yao]

> Arbitrary shell command injection via Utils.unpack()
> 
>
> Key: SPARK-38631
> URL: https://issues.apache.org/jira/browse/SPARK-38631
> Project: Spark
>  Issue Type: Bug
>  Components: Spark Core
>Affects Versions: 3.1.2, 3.2.1, 3.3.0
>Reporter: Hyukjin Kwon
>Assignee: Hyukjin Kwon
>Priority: Critical
> Fix For: 3.1.3, 3.3.0, 3.2.2
>
>
> There is a risk for arbitrary shell command injection via {{Utils.unpack}} 
> when the filename is controlled by a malicious user. This is due to an issue 
> in Hadoop's {{unTar}}, that is not properly escaping the filename before 
> passing to a shell 
> command:https://github.com/apache/hadoop/blob/trunk/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/FileUtil.java#L904



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

-
To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org
For additional commands, e-mail: issues-h...@spark.apache.org



[jira] [Commented] (SPARK-38631) Arbitrary shell command injection via Utils.unpack()

2022-03-25 Thread Kent Yao (Jira)


[ 
https://issues.apache.org/jira/browse/SPARK-38631?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17512296#comment-17512296
 ] 

Kent Yao commented on SPARK-38631:
--

[~hyukjin.kwon] Hi, shall we update the fixed versions?

> Arbitrary shell command injection via Utils.unpack()
> 
>
> Key: SPARK-38631
> URL: https://issues.apache.org/jira/browse/SPARK-38631
> Project: Spark
>  Issue Type: Bug
>  Components: Spark Core
>Affects Versions: 3.1.2, 3.2.1, 3.3.0
>Reporter: Hyukjin Kwon
>Assignee: Hyukjin Kwon
>Priority: Critical
>
> There is a risk for arbitrary shell command injection via {{Utils.unpack}} 
> when the filename is controlled by a malicious user. This is due to an issue 
> in Hadoop's {{unTar}}, that is not properly escaping the filename before 
> passing to a shell 
> command:https://github.com/apache/hadoop/blob/trunk/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/FileUtil.java#L904



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

-
To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org
For additional commands, e-mail: issues-h...@spark.apache.org



[jira] [Commented] (SPARK-38631) Arbitrary shell command injection via Utils.unpack()

2022-03-22 Thread Apache Spark (Jira)


[ 
https://issues.apache.org/jira/browse/SPARK-38631?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17511005#comment-17511005
 ] 

Apache Spark commented on SPARK-38631:
--

User 'HyukjinKwon' has created a pull request for this issue:
https://github.com/apache/spark/pull/35946

> Arbitrary shell command injection via Utils.unpack()
> 
>
> Key: SPARK-38631
> URL: https://issues.apache.org/jira/browse/SPARK-38631
> Project: Spark
>  Issue Type: Bug
>  Components: Spark Core
>Affects Versions: 3.1.2, 3.2.1, 3.3.0
>Reporter: Hyukjin Kwon
>Priority: Critical
>
> There is a risk for arbitrary shell command injection via {{Utils.unpack}} 
> when the filename is controlled by a malicious user. This is due to an issue 
> in Hadoop's {{unTar}}, that is not properly escaping the filename before 
> passing to a shell 
> command:https://github.com/apache/hadoop/blob/trunk/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/FileUtil.java#L904



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

-
To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org
For additional commands, e-mail: issues-h...@spark.apache.org



[jira] [Commented] (SPARK-38631) Arbitrary shell command injection via Utils.unpack()

2022-03-22 Thread Apache Spark (Jira)


[ 
https://issues.apache.org/jira/browse/SPARK-38631?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17511003#comment-17511003
 ] 

Apache Spark commented on SPARK-38631:
--

User 'HyukjinKwon' has created a pull request for this issue:
https://github.com/apache/spark/pull/35946

> Arbitrary shell command injection via Utils.unpack()
> 
>
> Key: SPARK-38631
> URL: https://issues.apache.org/jira/browse/SPARK-38631
> Project: Spark
>  Issue Type: Bug
>  Components: Spark Core
>Affects Versions: 3.1.2, 3.2.1, 3.3.0
>Reporter: Hyukjin Kwon
>Priority: Critical
>
> There is a risk for arbitrary shell command injection via {{Utils.unpack}} 
> when the filename is controlled by a malicious user. This is due to an issue 
> in Hadoop's {{unTar}}, that is not properly escaping the filename before 
> passing to a shell 
> command:https://github.com/apache/hadoop/blob/trunk/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/FileUtil.java#L904



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

-
To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org
For additional commands, e-mail: issues-h...@spark.apache.org