First published: Mon Feb 24 2020(Updated: )
Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | >=2.3.0<=2.3.2 | |
Apache Kylin | >=2.4.0<=2.4.1 | |
Apache Kylin | >=2.5.0<=2.5.2 | |
Apache Kylin | >=2.6.0<=2.6.4 | |
Apache Kylin | =3.0.0 | |
Apache Kylin | =3.0.0-alpha | |
Apache Kylin | =3.0.0-alpha2 | |
Apache Kylin | =3.0.0-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1937 is a vulnerability found in Apache Kylin, allowing an attacker to run malicious database queries through RESTful APIs.
The severity of CVE-2020-1937 is high, with a CVSS score of 8.8 out of 10.
Apache Kylin versions 2.3.0 to 2.3.2, 2.4.0 to 2.4.1, 2.5.0 to 2.5.2, and 2.6.0 to 2.6.4 are affected by CVE-2020-1937.
An attacker can exploit CVE-2020-1937 by concatenating SQLs with user input strings through the affected RESTful APIs.
Yes, you can find more information about CVE-2020-1937 and its references at the following links: <REFERENCE 1>, <REFERENCE 2>, <REFERENCE 3>.