{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-9159", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "http://sparkjava.com/news#spark-272-released", "refsource" : "MISC", "url" : "http://sparkjava.com/news#spark-272-released" }, { "name" : "https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668", "refsource" : "MISC", "url" : "https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668" }, { "name" : "https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd", "refsource" : "MISC", "url" : "https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd" }, { "name" : "https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc", "refsource" : "MISC", "url" : "https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc" }, { "name" : "https://github.com/perwendel/spark/issues/981", "refsource" : "MISC", "url" : "https://github.com/perwendel/spark/issues/981" }, { "name" : "RHSA-2018:2020", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2020" }, { "name" : "RHSA-2018:2405", "refsource" : "REDHAT", "url" : "https://access.redhat.com/errata/RHSA-2018:2405" } ] } }