logo

CVE-2024-52279 org.apache.zeppelin:zeppelin-jdbc

Package

Manager: maven
Name: org.apache.zeppelin:zeppelin-jdbc
Vulnerable Version: >=0.11.1 <0.12.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

EPSS: 0.00445 pctl0.62541

Details

Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue.

Metadata

Created: 2025-08-03T12:30:30Z
Modified: 2025-08-04T16:23:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-jr43-q92q-5q82/GHSA-jr43-q92q-5q82.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-jr43-q92q-5q82
Finding: F184
Auto approve: 1