{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:03:28.979","vulnerabilities":[{"cve":{"id":"CVE-2018-11804","sourceIdentifier":"security@apache.org","published":"2018-10-24T18:29:00.263","lastModified":"2024-11-21T03:44:04.093","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Spark's Apache Maven-based build includes a convenience script, 'build/mvn', that downloads and runs a zinc server to speed up compilation. It has been included in release branches since 1.3.x, up to and including master. This server will accept connections from external hosts by default. A specially-crafted request to the zinc server could cause it to reveal information in files readable to the developer account running the build. Note that this issue does not affect end users of Spark, only developers building Spark from source code."},{"lang":"es","value":"La build basada en Apache Maven de Spark incluye un script de conveniencia, \"build/mvn\", que descarga y ejecuta un servidor zinc para acelerar la compilación. Ha sido incluida en las ramas de lanzamiento desde las versiones 1.3.x hasta la master (incluida). El servidor aceptará conexiones de hosts externos por defecto. Una petición especialmente manipulada al servidor zinc podría provocar que revele información en archivos legibles por la cuenta de desarrollador que ejecuta la build. Nótese que este problema no afecta a los usuarios finales de Spark, solo a los desarrolladores que construyen Spark desde el código fuente."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*","versionStartIncluding":"1.3.0","versionEndExcluding":"2.2.3","matchCriteriaId":"E6DDE9C4-1C4F-4C99-A0C5-0B8C55614A67"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*","versionStartIncluding":"2.3.0","versionEndExcluding":"2.3.3","matchCriteriaId":"A7CAF602-1980-409A-8949-2F15CDCDF4C6"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105756","source":"security@apache.org","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https://lists.apache.org/thread.html/2b11aa4201e36f2ec8f728e722fe33758410f07784379cbefd0bda9d%40%3Cdev.spark.apache.org%3E","source":"security@apache.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://spark.apache.org/security.html#CVE-2018-11804","source":"security@apache.org","tags":["Mitigation","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105756","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https://lists.apache.org/thread.html/2b11aa4201e36f2ec8f728e722fe33758410f07784379cbefd0bda9d%40%3Cdev.spark.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://spark.apache.org/security.html#CVE-2018-11804","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}