CVE-2024-41169

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41169
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41169.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-41169
Aliases
Published
2025-07-12T17:15:20Z
Modified
2025-07-29T21:51:41Z
Summary
[none]
Details

The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files.

This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0.

Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.

References

Affected packages

Git / github.com/apache/zeppelin

Affected ranges

Type
GIT
Repo
https://github.com/apache/zeppelin
Events