Security for everyone

CVE-2022-33891 Scanner

Detects 'OS Command Injection' vulnerability in Apache Spark affects v. 3.0.3 and earlier, 3.1.1 to 3.1.2, 3.2.0 to 3.2.1..


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




Apache Spark is a widely used open-source distributed computing system that is designed to handle large-scale data processing. It can process data quickly across clusters with its in-memory processing capabilities and supports multiple programming languages, including Java, Python, and Scala. Apache Spark is commonly used for analytics, machine learning, and data processing tasks. The platform is popular because it’s fast, user-friendly, and can handle complex data processing tasks.

CVE-2022-33891 is a vulnerability that has been detected in Apache Spark. This vulnerability has been caused by enabling ACLs via the configuration option spark.acls.enable. When enabled, a malicious user can perform impersonation by providing an arbitrary user name, which passes through the authentication filter to determine whether the user has permissions to view or modify the application. A flaw in the HttpSecurityFilter mechanism allows a malicious user to execute arbitrary shell commands as the user that Spark is currently running as. This vulnerability affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.

Exploiting this vulnerability can lead to arbitrary shell command execution, and the attacker can gain full control of the Apache Spark framework. The attacker can leverage this control to extract sensitive information, disrupt services, and in some cases, maliciously alter the system settings to their advantage. A successful exploit of this vulnerability can also result in damage to the reputation of the organization, loss of revenue or intellectual property, and damage to customer trust.

The pro features of the platform can be very useful for identifying vulnerabilities in digital assets. With real-time vulnerability scanning, customized alerts, and detailed reporting, provides a comprehensive vulnerability management platform that can help ensure the security of your digital assets. Its intuitive interface and user-friendly design mean that even non-technical users can easily and quickly understand the vulnerabilities present in their systems and how to protect against them.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture