Apache Zeppelin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Apache Zeppelin could allow a remote attacker to bypass security restrictions, caused by improper input validation in the “Move folder to Trash” feature. By sending a specially-crafted request, an attacker could exploit this vulnerability to delete the arbitrary files.
Upgrade to the latest version of Apache Zeppelin, available from the Apache Website.