Executive Summary

Informations
Name CVE-2024-41169 First vendor Publication 2025-07-12
Vendor Cve Last vendor Modification 2025-07-29

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files.

This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0.

Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41169

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

Sources (Detail)

https://github.com/apache/zeppelin/pull/4841
https://issues.apache.org/jira/browse/ZEPPELIN-6101
https://lists.apache.org/thread/moyym04993c8owh4h0qj98r43tbo8qdd
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2025-07-29 21:20:45
  • Multiple Updates
2025-07-14 21:20:37
  • Multiple Updates
2025-07-12 21:20:42
  • First insertion