First published: Tue Apr 09 2024(Updated: )
Improper Input Validation vulnerability in Apache Zeppelin SAP. This issue affects Apache Zeppelin SAP: from 0.8.0 before 0.11.0. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. For more information, the fix already was merged in the source code but Zeppelin decided to retire the SAP component NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.zeppelin:sap | >=0.8.0<0.11.0 | 0.11.0 |
Apache Zeppelin | >=0.8.0<0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47894 has been classified as a moderate severity vulnerability due to improper input validation.
There is no fix for CVE-2022-47894 as the Apache Zeppelin project has been retired; users are advised to migrate to alternative solutions or restrict access.
CVE-2022-47894 affects Apache Zeppelin SAP versions from 0.8.0 to before 0.11.0.
Users are recommended to restrict access to affected systems as there are no updates or patches available for CVE-2022-47894.
CVE-2022-47894 could potentially allow attackers to exploit improper input validation, leading to unauthorized actions or data manipulation.