CVE-2024-31864: Apache Zeppelin: Remote code execution by adding malicious JDBC connection string

Related Vulnerabilities: CVE-2024-31864   CVE-2020-11974  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2024-31864: Apache Zeppelin: Remote code execution by adding malicious JDBC connection string

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: Jongyoul Lee &lt;jongyoul () apache org&gt;

Date: Tue, 09 Apr 2024 14:43:06 +0000

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: moderate

Affected versions:

- Apache Zeppelin before 0.11.1

Description:

Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin.

The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver.
This issue affects Apache Zeppelin: before 0.11.1.

Users are recommended to upgrade to version 0.11.1, which fixes the issue.

This issue is being tracked as ZEPPELIN-5990 

Credit:

rg (finder)

References:

https://github.com/apache/zeppelin/pull/4709
https://www.cve.org/CVERecord?id=CVE-2020-11974
https://zeppelin.apache.org/
https://www.cve.org/CVERecord?id=CVE-2024-31864
https://issues.apache.org/jira/browse/ZEPPELIN-5990

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

CVE-2024-31864: Apache Zeppelin: Remote code execution by adding malicious JDBC connection string Jongyoul Lee (Apr 09)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->