Apache Livy: Unauthorized directory access
Moderate severity
GitHub Reviewed
Published
Mar 13, 2026
to the GitHub Advisory Database
•
Updated Mar 16, 2026
Package
Affected versions
>= 0.3.0-incubating, < 0.9.0-incubating
Patched versions
0.9.0-incubating
Description
Published by the National Vulnerability Database
Mar 13, 2026
Published to the GitHub Advisory Database
Mar 13, 2026
Reviewed
Mar 16, 2026
Last updated
Mar 16, 2026
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache Livy.
This issue affects Apache Livy: from 0.3.0 before 0.9.0.
The vulnerability can only be exploited with non-default Apache Livy Server settings. If the configuration value "livy.file.local-dir-whitelist" is set to a non-default value, the directory checking can be bypassed.
Users are recommended to upgrade to version 0.9.0, which fixes the issue.
References