GHSA-m65c-wmw9-vmpp

Suggest an improvement
Source
https://github.com/advisories/GHSA-m65c-wmw9-vmpp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-m65c-wmw9-vmpp/GHSA-m65c-wmw9-vmpp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-m65c-wmw9-vmpp
Aliases
  • CVE-2024-31863
Published
2024-04-09T12:30:47Z
Modified
2024-05-02T15:01:34.250111Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Apache Zeppelin: Replacing other users notebook, bypassing any permissions
Details

Authentication Bypass by Spoofing vulnerability by replacing to exsiting notes in Apache Zeppelin. This issue affects Apache Zeppelin: from 0.10.1 before 0.11.0.

Users are recommended to upgrade to version 0.11.0, which fixes the issue.

Database specific
{
    "nvd_published_at": "2024-04-09T11:15:31Z",
    "cwe_ids": [
        "CWE-290"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-09T18:53:31Z"
}
References

Affected packages

Maven / org.apache.zeppelin:zeppelin-server

Package

Name
org.apache.zeppelin:zeppelin-server
View open source insights on deps.dev
Purl
pkg:maven/org.apache.zeppelin/zeppelin-server

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.10.1
Fixed
0.11.0

Affected versions

0.*

0.10.1