GHSA-qwfw-gxx2-mmv2

Suggest an improvement
Source
https://github.com/advisories/GHSA-qwfw-gxx2-mmv2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-qwfw-gxx2-mmv2/GHSA-qwfw-gxx2-mmv2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qwfw-gxx2-mmv2
Aliases
Published
2020-07-27T22:51:37Z
Modified
2023-11-08T04:02:22.518462Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Command Injection in Kylin
Details

Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-07-27T22:49:53Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-78"
    ]
}
References

Affected packages

Maven / org.apache.kylin:kylin-server-base

Package

Name
org.apache.kylin:kylin-server-base
View open source insights on deps.dev
Purl
pkg:maven/org.apache.kylin/kylin-server-base

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.0

Affected versions

1.*

1.5.3
1.5.4
1.5.4.1
1.6.0

2.*

2.0.0
2.1.0
2.2.0
2.3.0
2.3.1
2.3.2
2.4.0
2.4.1
2.5.0
2.5.1
2.5.2
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6

3.*

3.0.0-alpha
3.0.0-alpha2
3.0.0
3.0.1
3.0.2