CVE-2021-45456: Apache Kylin: Command injection

Related Vulnerabilities: CVE-2021-45456  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2021-45456: Apache Kylin: Command injection

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: "Xiaoxiang Yu" &lt;xxyu () apache org&gt;

Date: Thu, 6 Jan 2022 19:55:58 +0800 (CST)

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: moderate

Description:

Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the 
user. There is a mismatch between what is being checked and what is being used as the shell command argument in 
DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting 
in a command injection vulnerability.
This issue affects Apache Kylin 4.0.0.

Mitigation:

Users of Kylin 4.0.0 should upgrade to 4.0.1 or apply patch https://github.com/apache/kylin/pull/1781.

Credit:

Alvaro Munoz --

Best wishes to you ! 
From :Xiaoxiang Yu
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

CVE-2021-45456: Apache Kylin: Command injection Xiaoxiang Yu (Jan 06)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->