Looking for the vulnerability index of Invicti's legacy products?
Apache Spark Master Unauthorized Access Vulnerability - Vulnerability Database

Apache Spark Master Unauthorized Access Vulnerability

Description

Apache Spark is an open-source distributed cluster-computing framework that includes a Master service for cluster coordination.

The Spark Master service, which typically runs on port 7077, is designed to operate within trusted network environments and lacks built-in authentication by default. When this port is exposed to untrusted networks or the internet without proper access controls, unauthorized users can interact with the cluster management interface, potentially submitting malicious jobs or accessing sensitive cluster information.

Remediation

Implement network-level access controls to restrict access to the Spark Master port (default 7077) to only trusted clients and networks.

1. Configure firewall rules to block external access to port 7077 and only allow connections from authorized IP addresses or network ranges
2. Deploy Spark clusters behind a VPN or within a private network segment that is not directly accessible from the internet
3. Enable Spark's authentication mechanisms by setting the following properties in spark-defaults.conf:

spark.authenticate=true
spark.authenticate.secret=<strong-shared-secret>
4. For production environments, implement additional security measures such as SSL/TLS encryption for network communications:
spark.ssl.enabled=true
spark.ssl.keyStore=/path/to/keystore
spark.ssl.keyStorePassword=<password>
spark.ssl.trustStore=/path/to/truststore
spark.ssl.trustStorePassword=<password>
5. Regularly audit access logs and monitor for unauthorized connection attempts to the Master service

Related Vulnerabilities