Hamburger Icon
  • Labs icon Lab
  • Security
Google Cloud Platform icon
Labs

CVE-2022-33891 Apache Spark: Emulation and Detection

On July 18, 2022, Apache issued a security advisory regarding a recently discovered command injection vulnerability (CVE-2022-33891) in Apache Spark versions 3.0.3 and below, that when exploited allows threat actors to execute arbitrary commands. In this lab, we will learn how to detect, exploit, and mitigate attacks against vulnerable instances of Apache Spark.

Google Cloud Platform icon
Labs

Path Info

Level
Clock icon Advanced
Duration
Clock icon 1h 25m
Published
Clock icon Aug 20, 2024

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Getting Started in the Lab Environment

    Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

  2. Challenge

    Emulating an Attack Against Apache Spark

    In this section, we begin with the first challenge: emulating an attack against a vulnerable instance of Apache Spark. The challenge consists of two hands-on exercises, which include initial discovery and exploitation of the vulnerability.

  3. Challenge

    Detecting Attacks Against Apache Spark

    Armed with the knowledge of how to exploit the Spark vulnerability, we're ready to proceed with the next challenge: detecting exploitation attempts. The challenge consists of a hands-on exercise, where we leverage Apache's advanced logging and security capabilities to detect real-time attacks.

  4. Challenge

    Preventing Attacks Against Apache Spark

    With the knowledge of how to perform and detect attacks against Apache Spark, we are now ready to progress to the next challenge, where we leverage Apache to prevent attacks against vulnerable Spark instances. This challenge consists of a hands-on exercise, whereby the mod-security module will be configured to prevent real-time attacks.

  5. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.

West is an infosec professional specializing in offensive security. He serves as the team lead for the Commonwealth of Kentucky's enterprise red team and has over a decade of IT experience.

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.