Miggo Logo

CVE-2018-1328:
Cross-site Scripting in Apache Zeppelin

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.78501%
Published
4/24/2019
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.zeppelin:zeppelinmaven< 0.8.00.8.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The stored XSS vulnerability exists in Note permissions handling. Analysis focuses on:

  1. Input processing during permission configuration (setNotePermissions) where malicious payloads would be accepted
  2. Output generation when displaying permissions (getNotePermissions) where unsanitized data would be rendered

Though exact patch details are unavailable, the CVE description explicitly calls out Note permissions as the attack vector. These functions represent the most likely data flow path for the vulnerability based on Apache Zeppelin's architecture and standard XSS patterns in Java web applications.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p**** Z*pp*lin prior to *.*.* *** * stor** XSS issu* vi* Not* p*rmissions. Issu* r*port** *y "Josn* Jos*p*".

Reasoning

T** stor** XSS vuln*r**ility *xists in Not* p*rmissions **n*lin*. *n*lysis *o*us*s on: *. Input pro**ssin* *urin* p*rmission *on*i*ur*tion (s*tNot*P*rmissions) w**r* m*li*ious p*ylo**s woul* ** ****pt** *. Output **n*r*tion w**n *ispl*yin* p*rmissio