First published: Fri Dec 30 2022(Updated: )
In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | <4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-43396.
The severity of CVE-2022-43396 is high with a severity value of 8.8.
The affected software of CVE-2022-43396 is Apache Kylin version up to and excluding 4.0.3.
In CVE-2022-43396, a blacklist is used to filter the user input commands.
In CVE-2022-43396, the user can control the kylin.engine.spark-cmd parameter of conf.