Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue.
History

Tue, 04 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Tue, 05 Aug 2025 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:*

Tue, 05 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 Aug 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache zeppelin
Vendors & Products Apache
Apache zeppelin

Sun, 03 Aug 2025 10:15:00 +0000

Type Values Removed Values Added
Description Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue.
Title Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-08-03T10:02:05.153Z

Updated: 2025-11-04T21:09:03.247Z

Reserved: 2024-11-06T09:19:55.078Z

Link: CVE-2024-52279

cve-icon Vulnrichment

Updated: 2025-11-04T21:09:03.247Z

cve-icon NVD

Status : Modified

Published: 2025-08-03T10:15:27.517

Modified: 2025-11-04T22:16:04.523

Link: CVE-2024-52279

cve-icon Redhat

No data.