First published: Tue Jul 14 2020(Updated: )
Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | >=2.3.0<3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13925 is a vulnerability in Apache Kylin that allows remote execution of OS commands.
CVE-2020-13925 has a severity rating of 9.8 (critical).
Versions between 2.3.0 and 3.1.0 of Apache Kylin are affected by CVE-2020-13925.
The CWE IDs for CVE-2020-13925 are 20 and 78.
To fix CVE-2020-13925, users should update Apache Kylin to a version higher than 3.1.0.