Severity: moderate Affected versions:
- Apache Zeppelin (org.apache.zeppelin:zeppelin-server) 0.10.1 before 0.12.0 Description: The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files. This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter. Credit: SuperX <superxyy...@gmail.com> (finder) References: https://github.com/apache/zeppelin/pull/4841 https://zeppelin.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-41169