Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01NDI5LXBqd3ctNzY3Nc0hHA

SQL Injection in Apache Kylin

Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions.

Permalink: https://github.com/advisories/GHSA-5429-pjww-7675
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01NDI5LXBqd3ctNzY3Nc0hHA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 9 months ago


CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-5429-pjww-7675, CVE-2021-36774
References: Repository: https://github.com/apache/kylin
Blast Radius: 0.0

Affected Packages

maven:org.apache.kylin:kylin
Dependent packages: 2
Dependent repositories: 1
Downloads:
Affected Version Ranges: < 3.1.3
Fixed in: 3.1.3
All affected versions: 1.3.0, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.0, 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 3.1.1, 3.1.2
All unaffected versions: 3.1.3, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4