You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@spark.apache.org by "Apache Spark (Jira)" <ji...@apache.org> on 2022/03/23 04:03:00 UTC
[jira] [Assigned] (SPARK-38631) Arbitrary shell command injection via Utils.unpack()
[ https://issues.apache.org/jira/browse/SPARK-38631?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Apache Spark reassigned SPARK-38631:
------------------------------------
Assignee: (was: Apache Spark)
> Arbitrary shell command injection via Utils.unpack()
> ----------------------------------------------------
>
> Key: SPARK-38631
> URL: https://issues.apache.org/jira/browse/SPARK-38631
> Project: Spark
> Issue Type: Bug
> Components: Spark Core
> Affects Versions: 3.1.2, 3.2.1, 3.3.0
> Reporter: Hyukjin Kwon
> Priority: Critical
>
> There is a risk for arbitrary shell command injection via {{Utils.unpack}} when the filename is controlled by a malicious user. This is due to an issue in Hadoop's {{unTar}}, that is not properly escaping the filename before passing to a shell command:https://github.com/apache/hadoop/blob/trunk/hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/fs/FileUtil.java#L904
--
This message was sent by Atlassian Jira
(v8.20.1#820001)
---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscribe@spark.apache.org
For additional commands, e-mail: issues-help@spark.apache.org