First published: Fri May 22 2020(Updated: )
Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | >=2.3.0<=2.3.2 | |
Apache Kylin | >=2.4.0<=2.4.1 | |
Apache Kylin | >=2.5.0<=2.5.2 | |
Apache Kylin | >=2.6.0<=2.6.5 | |
Apache Kylin | =3.0.0 | |
Apache Kylin | =3.0.0-alpha | |
Apache Kylin | =3.0.0-alpha2 | |
Apache Kylin | =3.0.0-beta | |
Apache Kylin | =3.0.1 | |
Apache Kylin | =2.4.0 | |
Apache Kylin | =2.4.1 | |
maven/org.apache.kylin:kylin-core-common | >=3.0.0<3.0.2 | 3.0.2 |
maven/org.apache.kylin:kylin-core-common | <2.6.6 | 2.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1956 is an OS Command Injection Vulnerability in Apache Kylin.
Apache Kylin 2.3.0 and releases up to 2.6.5 and 3.0.1 has restful APIs that allow concatenation of OS commands with user input, enabling execution of arbitrary OS commands without protection or validation.
CVE-2020-1956 has a severity level of 8.8 (Critical).
Apache Kylin versions 2.3.0 to 2.6.5 and 3.0.1 are affected by CVE-2020-1956.
Upgrade your Apache Kylin installation to a version beyond 2.6.5 or 3.0.1 that includes the necessary security patches.