{"uuid": "500cdc18-132f-41c8-8fb6-59bb28615794", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-31860", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4321", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-31860\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Apache Zeppelin.\n\nBy adding relative path indicators (e.g `..`), attackers can see the contents for any files in the filesystem that the server account can access.\u00a0\nThis issue affects Apache Zeppelin from 0.9.0 before 0.11.0.\n\nUsers are recommended to upgrade to version 0.11.0, which fixes the issue.\n\ud83d\udccf Published: 2024-04-09T09:31:12Z\n\ud83d\udccf Modified: 2025-02-13T19:01:59Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-31860\n2. https://github.com/apache/zeppelin/pull/4632\n3. https://github.com/apache/zeppelin/commit/f025a697c1d1d0264064d5adf6cb0b20d85041b6\n4. https://github.com/apache/zeppelin\n5. https://lists.apache.org/thread/c0zfjnow3oc3dzc8w5rbkzj8lqj5jm5x\n6. http://www.openwall.com/lists/oss-security/2024/04/09/2", "creation_timestamp": "2025-02-13T19:18:45.000000Z"}