Vulnerability Description
Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Zeppelin | >= 0.11.1, < 0.12.0 |
Related Weaknesses (CWE)
References
- https://github.com/apache/zeppelin/pull/4838Issue Tracking
- https://issues.apache.org/jira/browse/ZEPPELIN-6095Issue Tracking
- https://lists.apache.org/thread/dxb98vgrb21rrl3k0fzonpk66onr6o4qVendor Advisory
- https://www.cve.org/CVERecord?id=CVE-2024-31864Not Applicable
- http://www.openwall.com/lists/oss-security/2025/08/03/3
FAQ
What is CVE-2024-52279?
CVE-2024-52279 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 be...
How severe is CVE-2024-52279?
CVE-2024-52279 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-52279?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Zeppelin.