{"id":"CVE-2024-41169","details":"The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files.\n\nThis issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0.\n\nUsers are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.","aliases":["GHSA-7pgf-ppxw-8624"],"modified":"2026-03-14T12:35:39.453Z","published":"2025-07-12T17:15:20.817Z","references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/07/13/1"},{"type":"FIX","url":"https://github.com/apache/zeppelin/pull/4841"},{"type":"FIX","url":"https://issues.apache.org/jira/browse/ZEPPELIN-6101"},{"type":"FIX","url":"https://lists.apache.org/thread/moyym04993c8owh4h0qj98r43tbo8qdd"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/zeppelin","events":[{"introduced":"fd74504199247f8a9f9c3950abf193c97cf1d771"},{"fixed":"9e0fcc7b8ea48167be3e71d135378a934e3f4b25"}],"database_specific":{"versions":[{"introduced":"0.10.1"},{"fixed":"0.12.0"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41169.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}