<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2024-31864: Apache Zeppelin: Remote code execution by adding malicious JDBC connection string
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Jongyoul Lee <jongyoul () apache org>
Date: Tue, 09 Apr 2024 14:43:06 +0000
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: moderate
Affected versions:
- Apache Zeppelin before 0.11.1
Description:
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin.
The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver.
This issue affects Apache Zeppelin: before 0.11.1.
Users are recommended to upgrade to version 0.11.1, which fixes the issue.
This issue is being tracked as ZEPPELIN-5990
Credit:
rg (finder)
References:
https://github.com/apache/zeppelin/pull/4709
https://www.cve.org/CVERecord?id=CVE-2020-11974
https://zeppelin.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-31864
https://issues.apache.org/jira/browse/ZEPPELIN-5990
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2024-31864: Apache Zeppelin: Remote code execution by adding malicious JDBC connection string Jongyoul Lee (Apr 09)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->