The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files. This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.
The product does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.
Link | Tags |
---|---|
https://github.com/apache/zeppelin/pull/4841 | patch vendor advisory |
https://issues.apache.org/jira/browse/ZEPPELIN-6101 | issue tracking patch |
https://lists.apache.org/thread/moyym04993c8owh4h0qj98r43tbo8qdd | vendor advisory patch issue tracking mailing list |