First published: Tue Apr 09 2024(Updated: )
Authentication Bypass by Spoofing vulnerability by replacing to exsiting notes in Apache Zeppelin. This issue affects Apache Zeppelin: from 0.10.1 before 0.11.0. Users are recommended to upgrade to version 0.11.0, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.zeppelin:zeppelin-server | >=0.10.1<0.11.0 | 0.11.0 |
Apache Zeppelin | =0.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31863 has been classified as a high severity vulnerability due to its potential for authentication bypass.
To fix CVE-2024-31863, upgrade to Apache Zeppelin version 0.11.0 or later.
Apache Zeppelin versions from 0.10.1 before 0.11.0 are affected by CVE-2024-31863.
CVE-2024-31863 is an authentication bypass vulnerability resulting from spoofing.
Organizations and individuals using affected versions of Apache Zeppelin should be concerned about CVE-2024-31863.