Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Apache Zeppelin - Unauthenticated Access

By kannthu

High
Vidoc logoVidoc Module
#misconfig#apache#zeppelin#unauth
Description

Apache Zeppelin - Unauthenticated Access

What is the "Apache Zeppelin - Unauthenticated Access?"

The "Apache Zeppelin - Unauthenticated Access" module is designed to detect a misconfiguration in the Apache Zeppelin server, where no authentication is required for access. Apache Zeppelin is an open-source web-based notebook that enables interactive data analytics and visualization. This module focuses on identifying instances where the server can be accessed without any form of authentication.

This module has a severity level of high, indicating that it poses a significant security risk if left unaddressed.

Author: j4vaovo

Impact

If the Apache Zeppelin server is accessible without authentication, it can potentially lead to unauthorized access and compromise sensitive data or functionality. Attackers could exploit this vulnerability to gain unauthorized control over the server, execute arbitrary code, or extract confidential information.

How does the module work?

The module works by sending an HTTP GET request to the "/api/security/ticket" endpoint of the Apache Zeppelin server. It then applies a set of matching conditions to determine if the server allows unauthenticated access.

The matching conditions for this module are as follows:

- The response body must contain the words "status":"OK" and "\"ticket\":\"anonymous\"". - The response headers must include the word "application/json". - The HTTP response status code must be 200 (OK).

If all of these conditions are met, the module will report a vulnerability, indicating that the Apache Zeppelin server is accessible without authentication.

Reference

- https://www.adminxe.com/2172.html

Metadata

verified: tr

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/api/security/ticket
Matching conditions
word: status":"OK, "ticket":"anonymous"and
word: application/jsonand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability