First published: Thu Mar 27 2025(Updated: )
Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. Through a kylin server, an attacker may forge a request to invoke "/kylin/api/xxx/diag" api on another internal host and possibly get leaked information. There are two preconditions: 1) The attacker has got admin access to a kylin server; 2) Another internal host has the "/kylin/api/xxx/diag" api endpoint open for service. This issue affects Apache Kylin: from 5.0.0 through 5.0.1. Users are recommended to upgrade to version 5.0.2, which fixes the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Kylin | ||
maven/org.apache.kylin:kylin-common-server | >=5.0.0<5.0.2 | 5.0.2 |
Apache Kylin | >=5.0.0<5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48944 is classified as a high severity vulnerability due to the potential for unauthorized sensitive information exposure.
To address CVE-2024-48944, upgrade to Apache Kylin version 5.0.2 or later.
CVE-2024-48944 exploits a Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin that allows attackers to forge requests to internal services.
CVE-2024-48944 affects users of Apache Kylin who have admin access and are running versions prior to 5.0.2.
The risks of CVE-2024-48944 include potential information leakage from internal hosts due to unauthorized API requests.