First published: Tue Jul 14 2020(Updated: )
Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible. Users of all previous versions after 2.0 should upgrade to 3.1.0.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | >=2.0.0<3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13926 is a vulnerability in Apache Kylin that allows SQL injection attacks.
CVE-2020-13926 has a severity rating of 9.8/10, making it a critical vulnerability.
Versions of Apache Kylin from 2.0.0 to 3.1.0 are affected by CVE-2020-13926.
CVE-2020-13926 can be exploited through SQL injection attacks by manipulating the system configurations.
Yes, you can find more information about CVE-2020-13926 in the following references: [Reference 1](https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E), [Reference 2](https://lists.apache.org/thread.html/r63d5663169e866d44ff9250796193337cff7d9cf61cc3839e86163fd%40%3Cuser.kylin.apache.org%3E).