|
|||
Rule General Information |
---|
Release Date: | 2024-04-29 | |
Rule Name: | Apache Kylin Remote Code Execution Vulnerability (CVE-2020-1956) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706 https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb |
|
Solutions |
---|
Refer to the announcement or patch by the vendor: https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d |