Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS01NDI5LXBqd3ctNzY3Nc0hHA
SQL Injection in Apache Kylin
Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions.
Permalink: https://github.com/advisories/GHSA-5429-pjww-7675JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01NDI5LXBqd3ctNzY3Nc0hHA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: 9 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-5429-pjww-7675, CVE-2021-36774
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-36774
- https://lists.apache.org/thread/lchpcvoolc6w8zc6vo1wstk8zbfqv2ow
- http://www.openwall.com/lists/oss-security/2022/01/06/5
- https://github.com/apache/kylin/pull/1646
- https://github.com/advisories/GHSA-5429-pjww-7675
Blast Radius: 0.0
Affected Packages
maven:org.apache.kylin:kylin
Dependent packages: 2Dependent repositories: 1
Downloads:
Affected Version Ranges: < 3.1.3
Fixed in: 3.1.3
All affected versions: 1.3.0, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.0, 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 3.1.1, 3.1.2
All unaffected versions: 3.1.3, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4