CVE-2024-31862 – Apache Zeppelin: Denial of service with invalid notebook name
https://notcve.org/view.php?id=CVE-2024-31862
Improper Input Validation vulnerability in Apache Zeppelin when creating a new note from Zeppelin's UI.This issue affects Apache Zeppelin: from 0.10.1 before 0.11.0. Users are recommended to upgrade to version 0.11.0, which fixes the issue. Vulnerabilidad de validación de entrada incorrecta en Apache Zeppelin al crear una nueva nota desde la interfaz de usuario de Zeppelin. Este problema afecta a Apache Zeppelin: desde 0.10.1 antes de 0.11.0. Se recomienda a los usuarios actualizar a la versión 0.11.0, que soluciona el problema. • http://www.openwall.com/lists/oss-security/2024/04/09/5 https://github.com/apache/zeppelin/pull/4632 https://lists.apache.org/thread/73xdjx43yg4yz8bd4p3o8vzyybkysmn0 • CWE-20: Improper Input Validation •
CVE-2022-47894 – Apache Zeppelin SAP: connecting to a malicious SAP server allowed it to perform XXE
https://notcve.org/view.php?id=CVE-2022-47894
Improper Input Validation vulnerability in Apache Zeppelin SAP.This issue affects Apache Zeppelin SAP: from 0.8.0 before 0.11.0. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. For more information, the fix already was merged in the source code but Zeppelin decided to retire the SAP component NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Vulnerabilidad de validación de entrada incorrecta en Apache Zeppelin SAP. Este problema afecta a Apache Zeppelin SAP: desde 0.8.0 antes de 0.11.0. Como este proyecto está retirado, no planeamos lanzar una versión que solucione este problema. • http://www.openwall.com/lists/oss-security/2024/04/09/4 https://github.com/apache/zeppelin/pull/4302 https://lists.apache.org/thread/csf4k73kkn3nx58pm0p2qrylbox4fvyy • CWE-20: Improper Input Validation •
CVE-2021-28656 – Apache Zeppelin: CSRF vulnerability in the Credentials page
https://notcve.org/view.php?id=CVE-2021-28656
Cross-Site Request Forgery (CSRF) vulnerability in Credential page of Apache Zeppelin allows an attacker to submit malicious request. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions. La vulnerabilidad de Cross-Site Request Forgery (CSRF) en la página de credenciales de Apache Zeppelin permite a un atacante enviar solicitudes maliciosas. Este problema afecta a Apache Zeppelin Apache Zeppelin versión 0.9.0 y versiones anteriores. • http://www.openwall.com/lists/oss-security/2024/04/09/3 https://lists.apache.org/thread/dttzkkv4qyn1rq2fdv1r94otb1osxztc • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2024-31860 – Apache Zeppelin: Path traversal vulnerability
https://notcve.org/view.php?id=CVE-2024-31860
Improper Input Validation vulnerability in Apache Zeppelin. By adding relative path indicators(E.g ..), attackers can see the contents for any files in the filesystem that the server account can access. This issue affects Apache Zeppelin: from 0.9.0 before 0.11.0. Users are recommended to upgrade to version 0.11.0, which fixes the issue. Vulnerabilidad de validación de entrada incorrecta en Apache Zeppelin. Al agregar indicadores de ruta relativa (por ejemplo .. ), los atacantes pueden ver el contenido de cualquier archivo en el sistema de archivos al que pueda acceder la cuenta del servidor. Este problema afecta a Apache Zeppelin: desde 0.9.0 antes de 0.11.0. Se recomienda a los usuarios actualizar a la versión 0.11.0, que soluciona el problema. • http://www.openwall.com/lists/oss-security/2024/04/09/2 https://github.com/apache/zeppelin/pull/4632 https://lists.apache.org/thread/c0zfjnow3oc3dzc8w5rbkzj8lqj5jm5x • CWE-20: Improper Input Validation •
CVE-2024-4439 – WordPress Core < 6.5.2 - Unauthenticated & Authenticated (Contributor+) Stored Cross-Site Scripting via Avatar Block
https://notcve.org/view.php?id=CVE-2024-4439
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar. WordPress Core es vulnerable a Cross-Site Scripting Almacenado a través de nombres para mostrar de usuario en el bloque Avatar en varias versiones hasta 6.5.2 debido a una salida insuficiente que se escapa en el nombre para mostrar. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. • https://github.com/d0rb/CVE-2024-4439 https://github.com/MielPopsssssss/CVE-2024-4439 https://github.com/xssor-dz/-CVE-2024-4439 https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=57950%40%2F&new=57950%40%2F&sfp_email=&sfph_mail=#file3 https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release https://www.wordfence.com • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •