Apache Zeppelin: Interpreter download command does not escape malicious code injection
CVE-2024-31866
9.8CRITICAL
Summary
The Apache Zeppelin platform is susceptible to an improper encoding or escaping of output vulnerability, allowing attackers to exploit configuration settings such as ZEPPELIN_INTP_CLASSPATH_OVERRIDES. By manipulating these settings, an attacker could execute shell scripts or malicious code, compromising the security of the system. It is crucial for users to upgrade to version 0.11.1 or later to mitigate this issue effectively.
Affected Version(s)
Apache Zeppelin 0.8.2 < 0.11.1
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Esa Hiltunen
https://teragrep.com