CVE-2022-43396 – org.apache.kylin:kylin
Package
Manager: maven
Name: org.apache.kylin:kylin
Vulnerable Version: >=2.0.0 <4.0.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00186 pctl0.40648
Details
Apache Kylin vulnerable to Command injection by Useless configuration In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the `kylin.engine.spark-cmd` parameter of `conf`.
Metadata
Created: 2022-12-30T12:30:25Z
Modified: 2023-01-10T16:13:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-f5q9-j9r2-34gq/GHSA-f5q9-j9r2-34gq.json
CWE IDs: ["CWE-184", "CWE-77"]
Alternative ID: GHSA-f5q9-j9r2-34gq
Finding: F422
Auto approve: 1