Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2024-41169

The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files. This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 10.3%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2024-41169
  • Apache » Zeppelin » Version: 0.10.1
    cpe:2.3:a:apache:zeppelin:0.10.1
  • Apache » Zeppelin » Version: 0.11.0
    cpe:2.3:a:apache:zeppelin:0.11.0
  • Apache » Zeppelin » Version: 0.11.1
    cpe:2.3:a:apache:zeppelin:0.11.1
  • Apache » Zeppelin » Version: 0.11.2
    cpe:2.3:a:apache:zeppelin:0.11.2


Contact Us

Shodan ® - All rights reserved