Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-31860", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "state": "PUBLISHED", "assignerShortName": "apache", "dateReserved": "2024-04-06T11:49:32.612Z", "datePublished": "2024-04-09T09:08:28.802Z", "dateUpdated": "2025-02-13T17:48:04.256Z"}, "containers": {"cna": {"affected": [{"collectionURL": "https://repo.maven.apache.org/maven2", "defaultStatus": "unaffected", "packageName": "org.apache.zeppelin:zeppelin-server", "product": "Apache Zeppelin", "vendor": "Apache Software Foundation", "versions": [{"lessThan": "0.11.0", "status": "affected", "version": "0.9.0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Kai Zhao"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in Apache Zeppelin.<br><br>By adding relative path indicators(E.g ..), attackers can see the contents for any files in the filesystem that the server account can access. <br><p>This issue affects Apache Zeppelin: from 0.9.0 before 0.11.0.</p><p>Users are recommended to upgrade to version 0.11.0, which fixes the issue.</p>"}], "value": "Improper Input Validation vulnerability in Apache Zeppelin.\n\nBy adding relative path indicators(E.g ..), attackers can see the contents for any files in the filesystem that the server account can access.\u00a0\nThis issue affects Apache Zeppelin: from 0.9.0 before 0.11.0.\n\nUsers are recommended to upgrade to version 0.11.0, which fixes the issue."}], "metrics": [{"other": {"content": {"text": "low"}, "type": "Textual description of severity"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2024-05-01T18:06:48.994Z"}, "references": [{"tags": ["patch"], "url": "https://github.com/apache/zeppelin/pull/4632"}, {"tags": ["vendor-advisory"], "url": "https://lists.apache.org/thread/c0zfjnow3oc3dzc8w5rbkzj8lqj5jm5x"}, {"url": "http://www.openwall.com/lists/oss-security/2024/04/09/2"}], "source": {"discovery": "UNKNOWN"}, "title": "Apache Zeppelin: Path traversal vulnerability", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"id": "CVE-2024-31860", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "version": "2.0.3", "timestamp": "2024-04-22T18:40:26.643857Z"}}}], "affected": [{"cpes": ["cpe:2.3:a:apache:zeppelin:0.9.0:*:*:*:*:*:*:*"], "vendor": "apache", "product": "zeppelin", "versions": [{"status": "affected", "version": "0.9.0"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:36:17.512Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T01:59:49.933Z"}, "title": "CVE Program Container", "references": [{"tags": ["patch", "x_transferred"], "url": "https://github.com/apache/zeppelin/pull/4632"}, {"tags": ["vendor-advisory", "x_transferred"], "url": "https://lists.apache.org/thread/c0zfjnow3oc3dzc8w5rbkzj8lqj5jm5x"}, {"url": "http://www.openwall.com/lists/oss-security/2024/04/09/2", "tags": ["x_transferred"]}]}]}}