{"id":"CVE-2017-7678","details":"In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.","aliases":["GHSA-r34r-f84j-5x4x"],"modified":"2026-04-10T04:00:58.921893Z","published":"2017-07-12T13:29:00.267Z","references":[{"type":"ADVISORY","url":"http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/99603"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/spark","events":[{"introduced":"0"},{"last_affected":"267aca5bd5042303a718d10635bc0d1a1596853f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.1.1"}]}}],"versions":["0.3-scala-2.8","alpha-0.2","v0.6.0","v0.7.0","v2.1.0","v2.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-7678.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}