We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-52279

Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string



Description

Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue.

Reserved 2024-11-06 | Published 2025-08-03 | Updated 2025-08-03 | Assigner apache

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

0.11.1 before 0.12.0
affected

Credits

H Ming finder

References

github.com/apache/zeppelin/pull/4838 patch

issues.apache.org/jira/browse/ZEPPELIN-6095 issue-tracking

www.cve.org/CVERecord?id=CVE-2024-31864 issue-tracking

lists.apache.org/thread/dxb98vgrb21rrl3k0fzonpk66onr6o4q vendor-advisory

cve.org (CVE-2024-52279)

nvd.nist.gov (CVE-2024-52279)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-52279

Support options

Helpdesk Chat, Email, Knowledgebase