org.apache.zeppelin:zeppelin-zengine@0.6.1 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.zeppelin:zeppelin-zengine package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Insecure Randomness

org.apache.zeppelin:zeppelin-zengine is a web-based notebook that enables interactive data analytics. You can make beautiful data-driven, interactive and collaborative documents with SQL, Scala and more.

Affected versions of the package are vulnerable to Insecure Random Number Generation due to the cryptographically insecure random().nextInt function which can produce predictable values and should not be used in security-sensitive context.

How to fix Insecure Randomness?

Upgrade zeppelin-zengine to version 0.8.0 or higher.

[,0.8.0)
  • M
Information Exposure

org.apache.zeppelin:zeppelin-zengine is a web-based notebook that enables interactive data analytics. You can make beautiful data-driven, interactive and collaborative documents with SQL, Scala and more.

Affected versions of the package are vulnerable to information disclosure when system data or debugging information leaves the program through an output stream or logging function.

Line 137: LOG.debug("Encrypted user key is {}", userKey);
Line 148: LOG.debug("IV is {}, IV length is {}", initVector, initVector.length());

These lines may print information which can reveal some important data to user making it vulnerable to attacks, we should not log this sensitive information.

How to fix Information Exposure?

Upgrade zeppelin-zengine to version 0.7.3 or higher.

[,0.7.3)