Hello,

Thank you for your opinion. Almost all opinions show that we'd better keep
Shell interpreter.

Following Apache rule, I'll make a vote in two days. Please leave your
various opinions.

Best regards,
Jongyoul Lee

2024년 4월 15일 (월) 오후 6:59, Danny Cranmer <dannycran...@apache.org>님이 작성:

> +1 for keeping the interpreter. It poses no additional security risk to any
> interpreter that runs arbitrary code. For instance, it is equivalent to
> running Python subprocess commands (unless I am missing something).
>
> Thanks,
> Danny
>
> On Mon, Apr 15, 2024 at 9:57 AM Cheng Pan <pan3...@gmail.com> wrote:
>
> > I think the real issue here is that the user is logged in with a normal
> > account, but runs a shell script using the system account, which is an
> > escalation of privileges.
> >
> > Considering the feature has existed for a long period, and the user knows
> > the behavior, it’s good to reserve it as long as there is a clear
> > disclaimer in the docs.
> >
> > I’m +0.5 for keeping it.
> >
> > Thanks,
> > Cheng Pan
> >
> >
> > > On Apr 13, 2024, at 16:04, Manhua Jiang <man...@apache.org> wrote:
> > >
> > > Hi All,
> > >
> > > I would like to vote keeping it.
> > > Zeppelin offers a way to run script without log in server, and
> > interpreter's permission is controlled.
> > > For the CVE, zeppelin should not make a lot effort to validate whether
> > user's code is safety or not(not only shell, but also all coding
> > interpreter like python,java,scala etc.), but try our best to keep it
> safe,
> > so offering a  server configuration to switch on/off(default to off)
> shell
> > interpreter to end-user should enough for those care about this CVE.
> > >
> > > BTW, share 2 ideas to avoid secure problem:
> > > 1. limited commands like HDFSFileInterpreter
> > > 2. shell interpreter add options to runAs a lower privilege user on
> > demand , and  zeppelin needs to be launched by sudoer
> > >
> > >
> > > On 2024/04/11 09:39:56 Jongyoul Lee wrote:
> > >> Hello,
> > >>
> > >> I want to discuss Shell interpreter issue with you.
> > >>
> > >> For your information, we had a security report using Shell interpreter
> > to
> > >> execute malicious code with a system account. As you know, it's a kind
> > of
> > >> characteristic of Apache Zeppelin but some contributors including me
> > >> thought it was too risky even if it's a feature. Moreover, I thought
> > that
> > >> we had some workarounds to do similar executions.
> > >>
> > >> However, after releasing it, there were many questions via several
> > channels
> > >> about the deprecation of Shell interpreter.
> > >>
> > >> I would like to follow the community's decision. For one more piece of
> > >> information, we already have a security page to warn the code
> execution
> > >> feature so we can keep the Shell interpreter without any further
> > treatment.
> > >>
> > >> Could you please give me your opinion on this?
> > >>
> > >> If we conclude keeping it, I'll release a new release of 0.11.2
> > including
> > >> Shell interpreter again.
> > >>
> > >> Best regards,
> > >> Jongyoul Lee
> > >>
> >
> >
>


-- 
Best regards,
Jongyoul Lee

Reply via email to