CVE-2024-51775
BaseFortify
Publication date: 2025-08-03
Last updated on: 2025-11-04
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | zeppelin | From 0.11.0 (inc) to 0.12.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1385 | The product uses a WebSocket, but it does not properly verify that the source of data or communication is valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Missing Origin Validation in WebSockets in Apache Zeppelin. It allows an attacker to access the Zeppelin server from a different origin without any restriction, potentially obtaining internal information about paragraphs.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability could gain unauthorized access to internal information on the Zeppelin server, which may lead to information disclosure and compromise of sensitive data within the application.
What immediate steps should I take to mitigate this vulnerability?
Users are recommended to upgrade Apache Zeppelin to version 0.12.0, which fixes the missing Origin Validation vulnerability.