Apache Zeppelin: Arbitrary file read by adding malicious JDBC connection string
Description
Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input.
This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Zeppelin 0.11.1 before 0.12.0 has an improper input validation flaw in JDBC URL handling, enabling arbitrary file reads via URL-encoded malicious strings.
Vulnerability
Overview
The improper input validation vulnerability in Apache Zeppelin's JDBC interpreter allows an attacker to bypass URL validation by encoding parts of the JDBC URL. The previous fix for CVE-2024-31864 did not account for URL-encoded input, leaving a bypass open [1][3]. This issue affects all Zeppelin versions from 0.11.1 up to but not including 0.12.0 [2].
Exploitation
Details
An attacker with the ability to add a JDBC connection string (for example, through notebook creation or interpreter configuration) can craft a malicious JDBC URL that uses percent-encoding (e.g., %2F for '/') to circumvent validation checks. The fix introduced in pull request #4838 adds validation on the decoded URL, ensuring that both raw and encoded forms of disallowed patterns are blocked [4]. No authentication is necessarily required if a user can submit notebooks or interpreter settings; in shared environments, any user with notebook creation privileges could exploit this.
Impact
Successful exploitation can lead to arbitrary file reads from the server's filesystem. By leveraging JDBC drivers (such as those for MySQL or Postgres) that support file storage in connection strings, an attacker may read sensitive files (e.g., configuration files, private keys, or data) accessible to the Zeppelin process [3]. The severity is rated moderate (CVSS v4.0 not yet assigned per NVD).
Mitigation
Users should upgrade to Apache Zeppelin version 0.12.0, which includes the fix that validates the decoded (UTF-8) JDBC URL [1][4]. No workaround is documented other than upgrading, as the validation bypass inherently undermines previous mitigations.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.zeppelin:zeppelin-jdbcMaven | >= 0.11.1, < 0.12.0 | 0.12.0 |
Affected products
2- Apache Software Foundation/Apache Zeppelinv5Range: 0.11.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/apache/zeppelin/pull/4838ghsapatchWEB
- github.com/advisories/GHSA-jr43-q92q-5q82ghsaADVISORY
- lists.apache.org/thread/dxb98vgrb21rrl3k0fzonpk66onr6o4qghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2024-52279ghsaADVISORY
- www.openwall.com/lists/oss-security/2025/08/03/3ghsaWEB
- issues.apache.org/jira/browse/ZEPPELIN-6095ghsaissue-trackingWEB
- www.cve.org/CVERecordghsaissue-trackingWEB
News mentions
0No linked articles in our index yet.