Lucene search

K
githubGitHub Advisory DatabaseGHSA-PPXX-M926-G569
HistoryJul 06, 2023 - 7:24 p.m.

Apache Kylin vulnerable to remote code execution

2023-07-0619:24:01
CWE-77
GitHub Advisory Database
github.com
4
kylin
command injection
remote code execution
configuration overwrites
vulnerability
rce
operating system command
apache kylin 2.6.5
apache kylin 3.1.2
apache kylin 4.0.1

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.041 Low

EPSS

Percentile

92.2%

Kylin’s cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.

Affected configurations

Vulners
Node
org.apache.kylin\Matchkylin
OR
org.apache.kylin\Matchkylin
OR
org.apache.kylin\Matchkylin

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.041 Low

EPSS

Percentile

92.2%

Related for GHSA-PPXX-M926-G569