Apache Zeppelin exposes server resources to unauthenticated attackers
High severity
GitHub Reviewed
Published
Jul 12, 2025
to the GitHub Advisory Database
•
Updated Jul 14, 2025
Description
Published by the National Vulnerability Database
Jul 12, 2025
Published to the GitHub Advisory Database
Jul 12, 2025
Reviewed
Jul 14, 2025
Last updated
Jul 14, 2025
The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files.
This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.
References