First published: Fri Dec 30 2022(Updated: )
Diagnosis Controller miss parameter validation, so user may attacked by command injection via HTTP Request.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | <4.0.3 | |
<4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44621 is a vulnerability in Apache Kylin, specifically in the Diagnosis Controller. It allows an attacker to execute commands via HTTP request due to the lack of parameter validation.
CVE-2022-44621 has a severity rating of 9.8 (Critical).
CVE-2022-44621 affects Apache Kylin by enabling an attacker to perform command injection through HTTP requests.
Apache Kylin version up to 4.0.3 is affected by CVE-2022-44621.
The fix for CVE-2022-44621 is not mentioned in the provided information, but it is recommended to update Apache Kylin to the latest version to mitigate this vulnerability.