CVE-2025-66249

Source
https://cve.org/CVERecord?id=CVE-2025-66249
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-66249.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-66249
Aliases
Published
2026-03-13T19:53:52.757Z
Modified
2026-04-10T05:34:16.342222Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache Livy.

This issue affects Apache Livy: from 0.3.0 before 0.9.0.

The vulnerability can only be exploited with non-default Apache Livy Server settings. If the configuration value "livy.file.local-dir-whitelist" is set to a non-default value, the directory checking can be bypassed.

Users are recommended to upgrade to version 0.9.0, which fixes the issue.

References

Affected packages

Git / github.com/apache/incubator-livy

Affected ranges

Type
GIT
Repo
https://github.com/apache/incubator-livy
Events
Database specific
{
    "versions": [
        {
            "introduced": "0.3.0"
        },
        {
            "fixed": "0.9.0"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-66249.json"