Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-31864", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "state": "PUBLISHED", "assignerShortName": "apache", "dateReserved": "2024-04-06T11:50:37.125Z", "datePublished": "2024-04-09T16:05:32.690Z", "dateUpdated": "2025-02-13T17:48:06.183Z"}, "containers": {"cna": {"affected": [{"collectionURL": "https://repo.maven.apache.org/maven2", "defaultStatus": "unaffected", "product": "Apache Zeppelin", "vendor": "Apache Software Foundation", "versions": [{"lessThan": "0.11.1", "status": "affected", "version": "0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "finder", "value": "rg"}, {"lang": "en", "type": "finder", "value": "Nbxiglk"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin.<br><br>The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver.<br><p>This issue affects Apache Zeppelin: before 0.11.1.</p><p>Users are recommended to upgrade to version 0.11.1, which fixes the issue.</p>"}], "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin.\n\nThe attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver.\nThis issue affects Apache Zeppelin: before 0.11.1.\n\nUsers are recommended to upgrade to version 0.11.1, which fixes the issue."}], "metrics": [{"other": {"content": {"text": "moderate"}, "type": "Textual description of severity"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code ('Code Injection')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2024-05-01T18:11:46.568Z"}, "references": [{"tags": ["patch"], "url": "https://github.com/apache/zeppelin/pull/4709"}, {"tags": ["related"], "url": "https://www.cve.org/CVERecord?id=CVE-2020-11974"}, {"tags": ["vendor-advisory"], "url": "https://lists.apache.org/thread/752qdk0rnkd9nqtornz734zwb7xdwcdb"}, {"url": "http://www.openwall.com/lists/oss-security/2024/04/09/8"}], "source": {"defect": ["ZEPPELIN-5990"], "discovery": "UNKNOWN"}, "title": "Apache Zeppelin: Remote code execution by adding malicious JDBC connection string", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"affected": [{"vendor": "apache", "product": "zeppelin", "cpes": ["cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "0.11.1", "versionType": "semver"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-07-31T21:01:13.020171Z", "id": "CVE-2024-31864", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-07-31T21:03:11.993Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T01:59:50.140Z"}, "title": "CVE Program Container", "references": [{"tags": ["patch", "x_transferred"], "url": "https://github.com/apache/zeppelin/pull/4709"}, {"tags": ["related", "x_transferred"], "url": "https://www.cve.org/CVERecord?id=CVE-2020-11974"}, {"tags": ["vendor-advisory", "x_transferred"], "url": "https://lists.apache.org/thread/752qdk0rnkd9nqtornz734zwb7xdwcdb"}, {"url": "http://www.openwall.com/lists/oss-security/2024/04/09/8", "tags": ["x_transferred"]}]}]}}