+1 for keeping the interpreter. It poses no additional security risk to any
interpreter that runs arbitrary code. For instance, it is equivalent to
running Python subprocess commands (unless I am missing something).

Thanks,
Danny

On Mon, Apr 15, 2024 at 9:57 AM Cheng Pan <pan3...@gmail.com> wrote:

> I think the real issue here is that the user is logged in with a normal
> account, but runs a shell script using the system account, which is an
> escalation of privileges.
>
> Considering the feature has existed for a long period, and the user knows
> the behavior, it’s good to reserve it as long as there is a clear
> disclaimer in the docs.
>
> I’m +0.5 for keeping it.
>
> Thanks,
> Cheng Pan
>
>
> > On Apr 13, 2024, at 16:04, Manhua Jiang <man...@apache.org> wrote:
> >
> > Hi All,
> >
> > I would like to vote keeping it.
> > Zeppelin offers a way to run script without log in server, and
> interpreter's permission is controlled.
> > For the CVE, zeppelin should not make a lot effort to validate whether
> user's code is safety or not(not only shell, but also all coding
> interpreter like python,java,scala etc.), but try our best to keep it safe,
> so offering a  server configuration to switch on/off(default to off) shell
> interpreter to end-user should enough for those care about this CVE.
> >
> > BTW, share 2 ideas to avoid secure problem:
> > 1. limited commands like HDFSFileInterpreter
> > 2. shell interpreter add options to runAs a lower privilege user on
> demand , and  zeppelin needs to be launched by sudoer
> >
> >
> > On 2024/04/11 09:39:56 Jongyoul Lee wrote:
> >> Hello,
> >>
> >> I want to discuss Shell interpreter issue with you.
> >>
> >> For your information, we had a security report using Shell interpreter
> to
> >> execute malicious code with a system account. As you know, it's a kind
> of
> >> characteristic of Apache Zeppelin but some contributors including me
> >> thought it was too risky even if it's a feature. Moreover, I thought
> that
> >> we had some workarounds to do similar executions.
> >>
> >> However, after releasing it, there were many questions via several
> channels
> >> about the deprecation of Shell interpreter.
> >>
> >> I would like to follow the community's decision. For one more piece of
> >> information, we already have a security page to warn the code execution
> >> feature so we can keep the Shell interpreter without any further
> treatment.
> >>
> >> Could you please give me your opinion on this?
> >>
> >> If we conclude keeping it, I'll release a new release of 0.11.2
> including
> >> Shell interpreter again.
> >>
> >> Best regards,
> >> Jongyoul Lee
> >>
>
>

Reply via email to