Potential Exposure of Spark History Server Keystore Password in Unsecured Files

Potential Exposure of Spark History Server Keystore Password in Unsecured Files

CVE-2017-9326 · LOW Severity

AV:N/AC:M/AU:S/C:P/I:N/A:N

The keystore password for the Spark History Server may be exposed in unsecured files under the /var/run/cloudera-scm-agent directory managed by Cloudera Manager. The keystore file itself is not exposed.

Learn more about our Cis Benchmark Audit For Server Software.