First published: Tue Apr 09 2024(Updated: )
Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin. The attackers can execute shell scripts or malicious code by overriding configuration like ZEPPELIN_INTP_CLASSPATH_OVERRIDES. This issue affects Apache Zeppelin: from 0.8.2 before 0.11.1. Users are recommended to upgrade to version 0.11.1, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.zeppelin:zeppelin-interpreter | >=0.8.2<0.11.1 | 0.11.1 |
Apache Zeppelin | >=0.8.2<0.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31866 is considered a high severity vulnerability due to its potential for executing arbitrary commands.
To remediate CVE-2024-31866, upgrade to Apache Zeppelin version 0.11.1 or later.
CVE-2024-31866 affects Apache Zeppelin versions from 0.8.2 to just before 0.11.1.
CVE-2024-31866 is classified as an improper encoding or escaping of output vulnerability.
CVE-2024-31866 allows attackers to execute shell scripts or malicious code by overriding specific configurations.