The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files. This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.
History

Tue, 29 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:*

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00017}

epss

{'score': 0.00029}


Mon, 14 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00017}


Sat, 12 Jul 2025 16:45:00 +0000

Type Values Removed Values Added
Description The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files. This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.
Title Apache Zeppelin: raft directory listing and file read
Weaknesses CWE-664
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-07-12T16:22:35.724Z

Updated: 2025-07-14T15:42:07.486Z

Reserved: 2024-07-17T08:42:21.067Z

Link: CVE-2024-41169

cve-icon Vulnrichment

Updated: 2025-07-14T15:41:22.388Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-12T17:15:20.817

Modified: 2025-07-29T15:07:15.753

Link: CVE-2024-41169

cve-icon Redhat

No data.