CVE-2021-27738

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-27738
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-27738.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-27738
Aliases
Published
2022-01-06T13:15:07Z
Modified
2024-09-02T22:12:06Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

All request mappings in StreamingCoordinatorController.java handling /kylin/api/streaming_coordinator/* REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.

References

Affected packages

Git / github.com/apache/kylin

Affected ranges

Type
GIT
Repo
https://github.com/apache/kylin
Events