This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54846 | Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string |
Github GHSA |
GHSA-jr43-q92q-5q82 | Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 05 Nov 2025 07:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 06 Aug 2025 03:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:* |
Wed, 06 Aug 2025 01:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 04 Aug 2025 17:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache zeppelin |
|
| Vendors & Products |
Apache
Apache zeppelin |
Sun, 03 Aug 2025 19:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue. | |
| Title | Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string | |
| Weaknesses | CWE-20 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-04T21:09:03.247Z
Reserved: 2024-11-06T09:19:55.078Z
Link: CVE-2024-52279
Updated: 2025-11-04T21:09:03.247Z
Status : Modified
Published: 2025-08-03T10:15:27.517
Modified: 2025-11-04T22:16:04.523
Link: CVE-2024-52279
No data.
OpenCVE Enrichment
Updated: 2025-08-04T17:09:15Z
EUVD
Github GHSA