First published: Thu Jan 06 2022(Updated: )
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | =4.0.0 | |
Apache Kylin | =4.0.0-alpha | |
Apache Kylin | =4.0.0-beta | |
=4.0.0 | ||
=4.0.0-alpha | ||
=4.0.0-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45456 is a vulnerability in Apache Kylin that allows an illegal project name to pass and potentially execute unauthorized commands.
CVE-2021-45456 has a severity rating of 9.8 (Critical).
Apache Kylin version 4.0.0, 4.0.0-alpha, and 4.0.0-beta are affected by CVE-2021-45456.
This vulnerability can be exploited by passing an illegal project name that bypasses the legitimacy check in Apache Kylin, allowing execution of unauthorized commands.
At the time of writing, there are no known fixes or patches available for CVE-2021-45456. It is recommended to keep an eye on the official Apache Kylin website or mailing list for any updates or security advisories.