logo

CVE-2023-29055 org.apache.kylin:kylin-core-common

Package

Manager: maven
Name: org.apache.kylin:kylin-core-common
Vulnerable Version: >=2.0.0 <4.0.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00101 pctl0.28418

Details

Apache Kylin has Insufficiently Protected Credentials In Apache Kylin version 2.0.0 to 4.0.3, there is a Server Config web interface that displays the content of file 'kylin.properties', that may contain serverside credentials. When the kylin service runs over HTTP (or other plain text protocol), it is possible for network sniffers to hijack the HTTP payload and get access to the content of kylin.properties and potentially the containing credentials. To avoid this threat, users are recommended to  * Always turn on HTTPS so that network payload is encrypted. * Avoid putting credentials in kylin.properties, or at least not in plain text. * Use network firewalls to protect the serverside such that it is not accessible to external attackers. * Upgrade to version Apache Kylin 4.0.4, which filters out the sensitive content that goes to the Server Config web interface.

Metadata

Created: 2024-01-29T15:30:25Z
Modified: 2025-02-13T19:33:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-3vvc-v8c2-43r7/GHSA-3vvc-v8c2-43r7.json
CWE IDs: ["CWE-522"]
Alternative ID: GHSA-3vvc-v8c2-43r7
Finding: F035
Auto approve: 1