First published: Tue Apr 09 2024(Updated: )
Improper Input Validation vulnerability in Apache Zeppelin. By adding relative path indicators (e.g `..`), attackers can see the contents for any files in the filesystem that the server account can access. This issue affects Apache Zeppelin from 0.9.0 before 0.11.0. Users are recommended to upgrade to version 0.11.0, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.zeppelin:zeppelin-server | >=0.9.0<0.11.0 | 0.11.0 |
Apache Zeppelin | >=0.9.0<0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31860 has been classified as a high-severity vulnerability due to improper input validation allowing unauthorized file access.
To fix CVE-2024-31860, upgrade your Apache Zeppelin installation to version 0.11.0 or later.
CVE-2024-31860 affects Apache Zeppelin versions from 0.9.0 to below 0.11.0.
CVE-2024-31860 is an improper input validation vulnerability.
Yes, CVE-2024-31860 can lead to data exposure by allowing attackers to access filesystem contents accessible to the server account.