This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54846 | Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string |
Github GHSA |
GHSA-jr43-q92q-5q82 | Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string |
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 05 Aug 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:* |
Tue, 05 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 04 Aug 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache zeppelin |
|
| Vendors & Products |
Apache
Apache zeppelin |
Sun, 03 Aug 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue. | |
| Title | Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string | |
| Weaknesses | CWE-20 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-04T21:09:03.247Z
Reserved: 2024-11-06T09:19:55.078Z
Link: CVE-2024-52279
Updated: 2025-11-04T21:09:03.247Z
Status : Modified
Published: 2025-08-03T10:15:27.517
Modified: 2025-11-04T22:16:04.523
Link: CVE-2024-52279
No data.
OpenCVE Enrichment
Updated: 2025-08-04T08:09:15Z
EUVD
Github GHSA