Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin.
The attackers can execute shell scripts or malicious code by overriding configuration like ZEPPELIN_INTP_CLASSPATH_OVERRIDES.
This issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.
Users are recommended to upgrade to version 0.11.1, which fixes the issue.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/04/09/10 | Mailing List |
https://github.com/apache/zeppelin/pull/4715 | Issue Tracking Patch |
https://lists.apache.org/thread/jpkbq3oktopt34x2n5wnhzc2r1410ddd | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/04/09/10 | Mailing List |
https://github.com/apache/zeppelin/pull/4715 | Issue Tracking Patch |
https://lists.apache.org/thread/jpkbq3oktopt34x2n5wnhzc2r1410ddd | Mailing List Vendor Advisory |
Configurations
History
05 May 2025, 20:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:* | |
First Time |
Apache zeppelin
Apache |
|
References | () http://www.openwall.com/lists/oss-security/2024/04/09/10 - Mailing List | |
References | () https://github.com/apache/zeppelin/pull/4715 - Issue Tracking, Patch | |
References | () https://lists.apache.org/thread/jpkbq3oktopt34x2n5wnhzc2r1410ddd - Mailing List, Vendor Advisory |
13 Feb 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin. The attackers can execute shell scripts or malicious code by overriding configuration like ZEPPELIN_INTP_CLASSPATH_OVERRIDES. This issue affects Apache Zeppelin: from 0.8.2 before 0.11.1. Users are recommended to upgrade to version 0.11.1, which fixes the issue. |
Information
Published : 2024-04-09 16:15
Updated : 2025-05-05 20:09
NVD link : CVE-2024-31866
Mitre link : CVE-2024-31866
CVE.ORG link : CVE-2024-31866
JSON object : View
Products Affected
apache
- zeppelin
CWE
CWE-116
Improper Encoding or Escaping of Output