Improper Input Validation Affecting org.apache.zeppelin:sap package, versions [0.8.0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEZEPPELIN-6592761
  • published9 Apr 2024
  • disclosed9 Apr 2024
  • creditkuiplatain@knownsec 404

Introduced: 9 Apr 2024

CVE-2022-47894  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Improper Input Validation when connecting to an SAP server. An attacker can exploit this vulnerability by convincing the server to connect to a malicious SAP server, leading to potential data disclosure or denial of service.

Note:

  1. This vulnerability only affects products that are no longer supported by the maintainer.

2)The fix already was merged in the source code but Zeppelin decided to retire the SAP component.

Workaround

This vulnerability can be mitigated by restricting access to the instance to trusted users only.

CVSS Scores

version 3.1