Apache Zeppelin: Interpreter download command does not escape malicious code injection
CVE-2024-31866

9.8CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
9 April 2024

Summary

The Apache Zeppelin platform is susceptible to an improper encoding or escaping of output vulnerability, allowing attackers to exploit configuration settings such as ZEPPELIN_INTP_CLASSPATH_OVERRIDES. By manipulating these settings, an attacker could execute shell scripts or malicious code, compromising the security of the system. It is crucial for users to upgrade to version 0.11.1 or later to mitigate this issue effectively.

Affected Version(s)

Apache Zeppelin 0.8.2 < 0.11.1

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Esa Hiltunen
https://teragrep.com
.