CVE-2024-31861
Apache Unconfirmed Vulnerability
Description
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
INFO
Published Date :
April 11, 2024, 9:15 a.m.
Last Modified :
June 21, 2024, 10:15 a.m.
Remotely Exploit :
No
Source :
[email protected]
Public PoC/Exploit Available at Github
CVE-2024-31861 has a 2 public
PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
此项目的POC来源为2024年以来各大威胁情报的高危漏洞复现,POC已通过nuclei或xray武器化,本项目旨在为网络安全爱好者们提供一点参考资料,可供个人研究使用,共勉
Shell Batchfile Python ASP.NET Java Classic ASP PHP
学而不思则罔,思而不学则殆💦
pentesting pentration-testing
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-31861
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-31861
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Rejected by [email protected]
Jun. 21, 2024
Action Type Old Value New Value -
CVE Modified by [email protected]
Jun. 21, 2024
Action Type Old Value New Value Changed Description Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin. The attackers can use Shell interpreter as a code generation gateway, and execute the generated code as a normal way. This issue affects Apache Zeppelin: from 0.10.1 before 0.11.1. Users are recommended to upgrade to version 0.11.1, which doesn't have Shell interpreter by default. Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. Removed Reference Apache Software Foundation https://github.com/apache/zeppelin/pull/4708 Removed Reference Apache Software Foundation https://lists.apache.org/thread/99clvqrht5l5r6kzjzwg2kj94boc9sfh Removed Reference Apache Software Foundation http://www.openwall.com/lists/oss-security/2024/04/10/8 Removed CWE Apache Software Foundation CWE-94 -
CVE Translated by [email protected]
Jun. 21, 2024
Action Type Old Value New Value Removed Translation Title: Apache Zeppelin Description: Vulnerabilidad de control inadecuado de generación de código ("inyección de código") en Apache Zeppelin. Los atacantes pueden utilizar el intérprete Shell como puerta de enlace de generación de código y ejecutar el código generado de forma normal. Este problema afecta a Apache Zeppelin: desde 0.10.1 antes de 0.11.1. Se recomienda a los usuarios actualizar a la versión 0.11.1, que no tiene intérprete de Shell de forma predeterminada. -
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
CVE Modified by [email protected]
May. 01, 2024
Action Type Old Value New Value Added Reference Apache Software Foundation http://www.openwall.com/lists/oss-security/2024/04/10/8 [No types assigned] -
CVE Received by [email protected]
Apr. 11, 2024
Action Type Old Value New Value Added Description Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin. The attackers can use Shell interpreter as a code generation gateway, and execute the generated code as a normal way. This issue affects Apache Zeppelin: from 0.10.1 before 0.11.1. Users are recommended to upgrade to version 0.11.1, which doesn't have Shell interpreter by default. Added Reference Apache Software Foundation https://github.com/apache/zeppelin/pull/4708 [No types assigned] Added Reference Apache Software Foundation https://lists.apache.org/thread/99clvqrht5l5r6kzjzwg2kj94boc9sfh [No types assigned] Added CWE Apache Software Foundation CWE-94