First published: Thu Jan 06 2022(Updated: )
Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.kylin:kylin | =4.0.0 | 4.0.1 |
maven/org.apache.kylin:kylin | <3.1.3 | 3.1.3 |
Apache Kylin | >=2.0.0<=2.6.6 | |
Apache Kylin | >=3.0.0<3.1.3 | |
Apache Kylin | =4.0.0 | |
Apache Kylin | =4.0.0-alpha | |
Apache Kylin | =4.0.0-beta | |
>=2.0.0<=2.6.6 | ||
>=3.0.0<3.1.3 | ||
=4.0.0 | ||
=4.0.0-alpha | ||
=4.0.0-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45458 is a vulnerability in Apache Kylin that allows users' encrypted passwords to be easily decrypted.
Apache Kylin encryption class PasswordPlaceholderConfigurer helps users encrypt their passwords.
The severity of CVE-2021-45458 is high, with a CVSS score of 7.5.
The versions affected by CVE-2021-45458 range from 2.0.0 to 2.6.6, 3.0.0 to 3.1.3, 4.0.0-alpha, 4.0.0-beta, and 4.0.0.
To fix CVE-2021-45458, users should update to version 4.0.1 for Apache Kylin or version 3.1.3 for the maven package org.apache.kylin:kylin.