Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1nNjRyLXhmMzktcTRwNc4AA6vv

Apache Zeppelin Path Traversal vulnerability

Improper Input Validation vulnerability in Apache Zeppelin.

By adding relative path indicators (e.g ..), attackers can see the contents for any files in the filesystem that the server account can access. 
This issue affects Apache Zeppelin from 0.9.0 before 0.11.0.

Users are recommended to upgrade to version 0.11.0, which fixes the issue.

Permalink: https://github.com/advisories/GHSA-g64r-xf39-q4p5
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nNjRyLXhmMzktcTRwNc4AA6vv
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 24 days ago
Updated: 24 days ago


CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Identifiers: GHSA-g64r-xf39-q4p5, CVE-2024-31860
References: Repository: https://github.com/apache/zeppelin
Blast Radius: 9.2

Affected Packages

maven:org.apache.zeppelin:zeppelin-server
Dependent packages: 0
Dependent repositories: 54
Downloads:
Affected Version Ranges: >= 0.9.0, < 0.11.0
Fixed in: 0.11.0
All affected versions: 0.9.0, 0.10.0, 0.10.1
All unaffected versions: 0.6.0, 0.6.1, 0.6.2, 0.7.0, 0.7.1, 0.7.2, 0.7.3, 0.8.0, 0.8.1, 0.8.2, 0.11.0, 0.11.1