Lucene search

K
githubGitHub Advisory DatabaseGHSA-66J8-C83M-GJ5F
HistoryApr 09, 2024 - 6:30 p.m.

Apache Zeppelin remote code execution by adding malicious JDBC connection string

2024-04-0918:30:22
CWE-94
GitHub Advisory Database
github.com
10
apache zeppelin
remote code execution
jdbc connection
mysql
vulnerability
upgrade
version 0.11.1

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0

Percentile

15.5%

Improper Control of Generation of Code (‘Code Injection’) vulnerability in Apache Zeppelin.

The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver. This issue affects Apache Zeppelin: before 0.11.1.

Users are recommended to upgrade to version 0.11.1, which fixes the issue.

Affected configurations

Vulners
Node
org.apache.zeppelinzeppelin-jdbcRange<0.11.1
VendorProductVersionCPE
org.apache.zeppelinzeppelin-jdbc*cpe:2.3:a:org.apache.zeppelin:zeppelin-jdbc:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0

Percentile

15.5%