First published: Thu Jan 06 2022(Updated: )
Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | >=2.0.0<=2.6.6 | |
Apache Kylin | >=3.0.0<3.1.3 | |
Apache Kylin | =4.0.0 | |
Apache Kylin | =4.0.0-alpha | |
Apache Kylin | =4.0.0-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-31522.
CVE-2021-31522 has a severity level of critical (9.8).
CVE-2021-31522 affects Apache Kylin 2 version 2.6.6 and prior versions, Apache Kylin 3 version 3.1.2 and prior versions, and Apache Kylin 4 version 4.0.0 and prior versions.
CVE-2021-31522 allows an attacker to provide user input and load any class, potentially leading to remote code execution.
Yes, you can find more information about CVE-2021-31522 at the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2022/01/06/4) and [Reference 2](https://lists.apache.org/thread/hh5crx3yr701zd8wtpqo1mww2rlkvznw).