Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin. The attackers can execute shell scripts or malicious code by overriding configuration like ZEPPELIN_INTP_CLASSPATH_OVERRIDES. This issue affects Apache Zeppelin: from 0.8.2 before 0.11.1. Users are recommended to upgrade to version 0.11.1, which fixes the issue.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Link | Tags |
---|---|
https://github.com/apache/zeppelin/pull/4715 | patch issue tracking |
https://lists.apache.org/thread/jpkbq3oktopt34x2n5wnhzc2r1410ddd | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2024/04/09/10 | mailing list |