First published: Thu Oct 13 2022(Updated: )
Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.kylin:kylin-server-base | <4.0.2 | 4.0.2 |
maven/org.apache.kylin:kylin-spark-project | <4.0.2 | 4.0.2 |
maven/org.apache.kylin:kylin-core-common | <4.0.2 | 4.0.2 |
Apache Kylin | >=2.0.0<2.6.6 | |
Apache Kylin | >=3.0.0<=3.1.2 | |
Apache Kylin | >=4.0.0<=4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24697 is a command injection vulnerability in Kylin's cube designer function when overwriting system parameters in the configuration overwrites menu.
CVE-2022-24697 has a severity rating of 9.8, which is considered critical.
CVE-2022-24697 allows an attacker to execute arbitrary operating system commands by injecting them through the parameter value of "--conf=" in Kylin's cube designer function.
CVE-2022-24697 affects versions up to (but not including) 4.0.2 of org.apache.kylin:kylin-server-base, org.apache.kylin:kylin-spark-project, and org.apache.kylin:kylin-core-common.
Yes, upgrading to version 4.0.2 of the affected software packages (org.apache.kylin:kylin-server-base, org.apache.kylin:kylin-spark-project, and org.apache.kylin:kylin-core-common) will fix CVE-2022-24697.