This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54778 | Apache Zeppelin exposes server resources to unauthenticated attackers |
Github GHSA |
GHSA-7pgf-ppxw-8624 | Apache Zeppelin exposes server resources to unauthenticated attackers |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 29 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:* |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Sat, 12 Jul 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files. This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter. | |
| Title | Apache Zeppelin: raft directory listing and file read | |
| Weaknesses | CWE-664 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-07-14T15:42:07.486Z
Reserved: 2024-07-17T08:42:21.067Z
Link: CVE-2024-41169
Updated: 2025-07-14T15:41:22.388Z
Status : Analyzed
Published: 2025-07-12T17:15:20.817
Modified: 2025-07-29T15:07:15.753
Link: CVE-2024-41169
No data.
OpenCVE Enrichment
Updated: 2025-07-14T22:45:29Z
EUVD
Github GHSA