First published: Thu Jan 06 2022(Updated: )
In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | >=2.0.0<=2.6.6 | |
Apache Kylin | >=3.0.0<3.1.3 | |
Apache Kylin | =4.0.0 | |
Apache Kylin | =4.0.0-alpha | |
Apache Kylin | =4.0.0-beta | |
>=2.0.0<=2.6.6 | ||
>=3.0.0<3.1.3 | ||
=4.0.0 | ||
=4.0.0-alpha | ||
=4.0.0-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45457 is a vulnerability in Apache Kylin that allows cross-origin requests with credentials from any origin.
CVE-2021-45457 affects Apache Kylin 2 version 2.6.6 and prior, Apache Kylin 3 version 3.1.2 and prior, Apache Kylin 4 version 4.0.0 and prior.
CVE-2021-45457 has a severity score of 7.5 (high).
To fix CVE-2021-45457, upgrade to a version of Apache Kylin that is not affected by the vulnerability.
You can find more information about CVE-2021-45457 on the following references: [http://www.openwall.com/lists/oss-security/2022/01/06/2](http://www.openwall.com/lists/oss-security/2022/01/06/2), [https://lists.apache.org/thread/rzv4mq58okwj1n88lry82ol2wwm57q1m](https://lists.apache.org/thread/rzv4mq58okwj1n88lry82ol2wwm57q1m).