Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ycjU5LWg2cmgtdjg0ds4AA6vw
Apache Zeppelin SAP: connecting to a malicious SAP server allowed it to perform XXE
Improper Input Validation vulnerability in Apache Zeppelin SAP. This issue affects Apache Zeppelin SAP: from 0.8.0 before 0.11.0.
As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.
For more information, the fix already was merged in the source code but Zeppelin decided to retire the SAP component
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ycjU5LWg2cmgtdjg0ds4AA6vw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 9 months ago
Updated: 9 months ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Percentage: 0.00045
EPSS Percentile: 0.17541
Identifiers: GHSA-rr59-h6rh-v84v, CVE-2022-47894
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-47894
- https://github.com/apache/zeppelin/pull/4302
- https://lists.apache.org/thread/csf4k73kkn3nx58pm0p2qrylbox4fvyy
- https://github.com/apache/zeppelin/commit/bea51d1467d6103bd8fd68d6a27b14f954d98ec6
- https://issues.apache.org/jira/browse/ZEPPELIN-5665
- http://www.openwall.com/lists/oss-security/2024/04/09/4
- https://github.com/advisories/GHSA-rr59-h6rh-v84v
Blast Radius: 1.0
Affected Packages
maven:org.apache.zeppelin:sap
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: >= 0.8.0, < 0.11.0
Fixed in: 0.11.0
All affected versions: 0.8.0, 0.8.1, 0.8.2, 0.9.0, 0.10.0, 0.10.1
All unaffected versions: