In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
                
            References
                    | Link | Resource | 
|---|---|
| http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html | Vendor Advisory | 
| http://www.securityfocus.com/bid/99603 | Third Party Advisory VDB Entry | 
| http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html | Vendor Advisory | 
| http://www.securityfocus.com/bid/99603 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 03:32
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html - Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/99603 - Third Party Advisory, VDB Entry | 
Information
                Published : 2017-07-12 13:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-7678
Mitre link : CVE-2017-7678
CVE.ORG link : CVE-2017-7678
JSON object : View
Products Affected
                apache
- spark
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
