当前位置:网站首页>Tianyi cloud web application firewall (edge cloud version) supports the detection and interception of Apache spark shell command injection vulnerabilities
Tianyi cloud web application firewall (edge cloud version) supports the detection and interception of Apache spark shell command injection vulnerabilities
2022-07-26 17:46:00 【51CTO】
Dear Tianyi cloud users : In recent days, ,Apache Spark appear shell Command injection vulnerability , The vulnerability is harmful and POC It has been made public . As of the date of issuance , Tianyi cloud Web Application firewall ( Edge cloud ) A large number of related attacks have been monitored and intercepted - blow , Please take relevant protective measures with the user as soon as possible .
Vulnerability description
Apache Spark It's Apache (Apache) A large-scale data processing engine of the software foundation that supports acyclic data flow and in memory computing , If Apache Spark UI To enable the ACL, be HttpSecurityFilter The code path in allows you to simulate execution by providing any user name . Malicious users may be able to access the permission check function , This function will eventually build a Unix shell Command and execute it . This will result in arbitrary shell Command execution .
Vulnerability Details
Vulnerability name :Apache Spark shell Command injection vulnerability
Hole number :CVE-2022-33891
Hole type : Command injection
Component name :Apache Spark
Affects version :Spark Core – Apache<=3.0.3>=3.1.1&&<=3.1.2>=3.2.0&&<=3.2.1
Vulnerability level : High-risk
Self inspection suggestions
obtain spark edition , Determine whether the version is (∞, 3.0.3]、[3.1.1, 3.1.2]、[3.2.0, 3.2.2) In the range .
Bug fix or mitigation recommendations
The manufacturer has released a patch to fix the vulnerability , Please update to the safe version as soon as possible :Apache Spark 3.1.3、 3.2.2 or 3.3.0 Or later .
Tianyi cloud Web Application firewall ( Edge cloud ) Detection and interception of this vulnerability is supported
Tianyi cloud security research team is in 2022 year 7 month 18 The attention and research work on this vulnerability will be started on the th , Early warning and defense of the vulnerability in advance , Has been in 2022 year 7 month 18 This vulnerability protection is supported on the day , And in 2022 year 7 month 20 Capture this day Apache Spark shell Command injection vulnerability attack - Hitting behavior , Attacking - Help users detect and defend in advance before large-scale attacks occur .
Tianyi cloud has been purchased Web Application firewall ( Edge cloud ) Users of can be protected from this vulnerability without any action , For consultation, please call 400-810-9889 turn 1.
Web Application firewall ( Edge cloud )
1、 Order Web Application firewall ( Edge cloud ) after , Access the protection domain name on the self-service customer console , Access protection domain name supports protection by default , There is no need to manually update the rule base and configuration .
2、 Order Web Application firewall ( Edge cloud ) service . First step , Open tianyiyun official website http://www.ctyun.cn, Register and log in ; The second step , Users without real name authentication need to complete real name authentication according to the prompt to open Web Application firewall ( Edge cloud ) service ; The third step ,BCP The portal already supports ordering , Self service opening function after ordering ; Click the business acceptance form - Create acceptance form ( The trial / commercial )- Add resources - Safety products -Web Application firewall ( Edge cloud )- Submit resources .

3、 After the successful opening , Log in to the customer console : https://cdn.ctyun.cn/h5/ctwaf, Access protection domain name , The protection switch is confirmed as on .
First step , Get into Web Application firewall ( Edge cloud ) Console client , choice 【 Domain name management 】, Click on 【 Add domain name 】;
The second step , Fill in the domain name access information , Fill in the origin information of the domain name according to the guidance of the page 、 Request protocol 、 Service port 、 Back to source protocol, back to source port and other information ;
Add domain name configuration page

The third step , According to your needs , Fill in the origin information of the domain name 、 Request protocol 、 Service port 、 Back to source protocol, back to source port and other information , Click on 【 next step 】 Fill in the domain name security configuration page ;
Domain name security configuration information page
Step four , Select the protection mode and protection template of the domain name , Click on 【 Submit 】; After successful submission , You can click on the 【 Return to the list of domain names 】 page ;
Step five , Complete the operation of adding a new domain name , When the configuration is complete , The domain name management page provides cname Address ;
Step six , To enable the Web Application Firewall Service , You need to protect the domain name DNS The parsing points to the CNAME, In this way, the request to access the protected domain name can be forwarded to the security node , Achieve protective effect .
边栏推荐
- 如何快速使用 ELisp 进行插件编写
- Tupu 3D visual national style design | collision between technology and culture "cool" spark“
- Performance tuning bugs emerge in endlessly? These three documents can easily handle JVM tuning
- 深度学习实验:Softmax实现手写数字识别
- A collection of commonly used shortcut keys for office software
- 大家下午好,请教一个问题:如何从保存点启动一个之前以SQL提交的作业?问题描述:用SQL在cl
- 236. 二叉树的最近公共祖先
- 注意 公安部发出旅游客运交通安全预警
- ACL实验演示(Huawei路由器设备配置)
- Open source kaggle cat and dog data set -- used in classic CNN classification practice
猜你喜欢

AI遮天传 DL-多层感知机
![Leetcode:1206. design jump table [jump table board]](/img/4f/2b6df8e2151b8bce70c8227c69d8bc.png)
Leetcode:1206. design jump table [jump table board]

【集训Day1】 Dwarves line up

大咖访谈 | 开源对安全是双刃剑——《大教堂与集市》中文译本作者卫剑钒

A detailed explanation of throughput, QPS, TPS, concurrency and other high concurrency indicators

Machine learning - what are machine learning, supervised learning, and unsupervised learning

二层管理型交换机如何设置IP

国际大咖 VS 本土开源新星 | ApacheCon Asia 主题演讲议程全览

2019 popularization group summary

Heavy announcement! Icml2022 Awards: 15 outstanding papers, selected by Fudan University, Xiamen University and Shanghai Jiaotong University
随机推荐
Heavy! The 2022 China open source development blue book was officially released
After vs code is formatted, the function name will be automatically followed by a space
二层管理型交换机如何设置IP
(25) top level menu of blender source code analysis blender menu
SQL注入(思维导图)
Environment setup mongodb
Brief introduction to CUDA image construction
树形dp问题
GAN (Generative Adversarial Network,GAN)生成式对抗网络
Mondriaans's dream (state compression DP)
【OpenCV 例程 300篇】240. OpenCV 中的 Shi-Tomas 角点检测
Basic select statement
数据库使用psql及jdbc进行远程连接,不定时自动断开的解决办法
The latest interface of Taobao / tmall keyword search
即刻报名|飞桨黑客马拉松第三期盛夏登场,等你挑战
Performance tuning bugs emerge in endlessly? These three documents can easily handle JVM tuning
6-19 vulnerability exploitation -nsf to obtain the target password file
SQL injection (mind map)
第16周OJ实践1 计算该日在本年中是第几天
Overview of the agenda of the keynote speech of apachecon Asia, an international celebrity vs a local open source star