This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54778 | Apache Zeppelin exposes server resources to unauthenticated attackers |
Github GHSA |
GHSA-7pgf-ppxw-8624 | Apache Zeppelin exposes server resources to unauthenticated attackers |
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 29 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:* |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Sat, 12 Jul 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files. This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter. | |
| Title | Apache Zeppelin: raft directory listing and file read | |
| Weaknesses | CWE-664 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-04T21:08:42.107Z
Reserved: 2024-07-17T08:42:21.067Z
Link: CVE-2024-41169
Updated: 2025-11-04T21:08:42.107Z
Status : Modified
Published: 2025-07-12T17:15:20.817
Modified: 2025-11-04T22:16:02.603
Link: CVE-2024-41169
No data.
OpenCVE Enrichment
Updated: 2025-07-14T22:45:29Z
EUVD
Github GHSA