<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2021-45456: Apache Kylin: Command injection
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: "Xiaoxiang Yu" <xxyu () apache org>
Date: Thu, 6 Jan 2022 19:55:58 +0800 (CST)
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: moderate
Description:
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the
user. There is a mismatch between what is being checked and what is being used as the shell command argument in
DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting
in a command injection vulnerability.
This issue affects Apache Kylin 4.0.0.
Mitigation:
Users of Kylin 4.0.0 should upgrade to 4.0.1 or apply patch https://github.com/apache/kylin/pull/1781.
Credit:
Alvaro Munoz --
Best wishes to you !
From :Xiaoxiang Yu
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2021-45456: Apache Kylin: Command injection Xiaoxiang Yu (Jan 06)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->