[MAVEN:GHSA-PPXX-M926-G569] Apache Kylin vulnerable to remote code execution
Severity
Critical
Affected Packages
3
Fixed Packages
3
CVEs
1
Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.
Package | Affected Version |
---|---|
pkg:maven/org.apache.kylin/kylin-spark-project | < 4.0.2 |
pkg:maven/org.apache.kylin/kylin-server-base | < 4.0.2 |
pkg:maven/org.apache.kylin/kylin-core-common | < 4.0.2 |
Package | Fixed Version |
---|---|
pkg:maven/org.apache.kylin/kylin-spark-project | = 4.0.2 |
pkg:maven/org.apache.kylin/kylin-server-base | = 4.0.2 |
pkg:maven/org.apache.kylin/kylin-core-common | = 4.0.2 |
- ID
- MAVEN:GHSA-PPXX-M926-G569
- Severity
- critical
- URL
- https://github.com/advisories/GHSA-ppxx-m926-g569
- Published
-
2023-07-06T19:24:01
(14 months ago) - Modified
-
2023-08-08T21:28:40
(13 months ago) - Rights
- Maven Security Team
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.apache.kylin/kylin-spark-project | org.apache.kylin | kylin-spark-project | < 4.0.2 | |||
Fixed | pkg:maven/org.apache.kylin/kylin-spark-project | org.apache.kylin | kylin-spark-project | = 4.0.2 | |||
Affected | pkg:maven/org.apache.kylin/kylin-server-base | org.apache.kylin | kylin-server-base | < 4.0.2 | |||
Fixed | pkg:maven/org.apache.kylin/kylin-server-base | org.apache.kylin | kylin-server-base | = 4.0.2 | |||
Affected | pkg:maven/org.apache.kylin/kylin-core-common | org.apache.kylin | kylin-core-common | < 4.0.2 | |||
Fixed | pkg:maven/org.apache.kylin/kylin-core-common | org.apache.kylin | kylin-core-common | = 4.0.2 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |