Apache

Kylin

21 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.65%
  • Published 06.01.2022 13:15:08
  • Last modified 21.11.2024 06:32:14

Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class Passwor...

  • EPSS 1.17%
  • Published 06.01.2022 13:15:08
  • Last modified 21.11.2024 06:32:14

In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prio...

  • EPSS 49.53%
  • Published 06.01.2022 13:15:08
  • Last modified 21.11.2024 06:32:14

Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. ...

  • EPSS 0.83%
  • Published 06.01.2022 13:15:08
  • Last modified 21.11.2024 06:14:04

Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL ser...

  • EPSS 5.23%
  • Published 06.01.2022 13:15:08
  • Last modified 21.11.2024 06:05:51

Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

  • EPSS 2.94%
  • Published 06.01.2022 13:15:07
  • Last modified 21.11.2024 05:58:29

All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/u...

  • EPSS 93.35%
  • Published 19.10.2020 21:15:12
  • Last modified 21.11.2024 05:02:11

Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which expose...

  • EPSS 3.11%
  • Published 14.07.2020 13:15:11
  • Last modified 21.11.2024 05:02:09

Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is pos...

  • EPSS 84.7%
  • Published 14.07.2020 13:15:11
  • Last modified 21.11.2024 05:02:09

Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibili...

Warning Exploit
  • EPSS 93.75%
  • Published 22.05.2020 14:15:11
  • Last modified 06.03.2025 19:48:51

Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.