Remote Code Execution in Apache Zeppelin before 0.8.0
CVE-2018-1317
8.8HIGH
Summary
In versions of Apache Zeppelin prior to 0.8.0, the cron scheduler was enabled by default, which posed a significant security risk. This configuration allowed authenticated users to execute code paragraphs as other users without the necessary authentication, potentially exposing sensitive data and enabling unauthorized actions within the system. Updating to version 0.8.0 or later mitigates this vulnerability, ensuring that the cron scheduler is secure and does not allow unauthorized code execution across user sessions.
Affected Version(s)
Apache Zeppelin prior to 0.8.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved