CVE-2021-45458 – org.apache.kylin:kylin
Package
Manager: maven
Name: org.apache.kylin:kylin
Vulnerable Version: >=0 <3.1.3 || =4.0.0 || >=4.0.0 <4.0.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00649 pctl0.69909
Details
Use of Hard-coded Credentials in Apache Kylin Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
Metadata
Created: 2022-01-08T00:43:09Z
Modified: 2023-07-21T19:24:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-9fj5-jg6f-qg5r/GHSA-9fj5-jg6f-qg5r.json
CWE IDs: ["CWE-326", "CWE-330", "CWE-798"]
Alternative ID: GHSA-9fj5-jg6f-qg5r
Finding: F052
Auto approve: 1