Lucene search

K
githubGitHub Advisory DatabaseGHSA-66J8-C83M-GJ5F
HistoryApr 09, 2024 - 6:30 p.m.

Apache Zeppelin remote code execution by adding malicious JDBC connection string

2024-04-0918:30:22
CWE-94
GitHub Advisory Database
github.com
5
apache zeppelin
remote code execution
jdbc connection
mysql
vulnerability
upgrade
version 0.11.1

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Improper Control of Generation of Code (‘Code Injection’) vulnerability in Apache Zeppelin.

The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver. This issue affects Apache Zeppelin: before 0.11.1.

Users are recommended to upgrade to version 0.11.1, which fixes the issue.

Affected configurations

Vulners
Node
org.apache.zeppelin\zeppelinMatchjdbc

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Related for GHSA-66J8-C83M-GJ5F