Cherry Li created ZEPPELIN-5624: ----------------------------------- Summary: Arbitrary file deletion vulnerability Key: ZEPPELIN-5624 URL: https://issues.apache.org/jira/browse/ZEPPELIN-5624 Project: Zeppelin Issue Type: Bug Components: security Affects Versions: 0.10.0, 0.9.0 Reporter: Cherry Li Attachments: [Hotfix]_Determine_the_legality_of_the_incoming_file_path.patch
I found a vulnerability in the Apache zeppelin (Unauthorized Level Vulnerability) project. By accessing {code:java} /api/interpreter/setting/..%2Flogs {code} you can delete the logs folder in the directory where the current project is located, if it is changed to {code:java} /api/interpreter/setting/..%2F..%2Fzeppelin {code} , then you can delete the entire zeppelin application directory, including all configuration files, zeppelin main program files, etc. -- This message was sent by Atlassian Jira (v8.20.1#820001)