Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1odzNtLThoMjUtOGZyd80hKA

Command Injection in Apache Kylin

Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.

Permalink: https://github.com/advisories/GHSA-hw3m-8h25-8frw
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1odzNtLThoMjUtOGZyd80hKA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: about 1 year ago


Identifiers: GHSA-hw3m-8h25-8frw, CVE-2021-45456
References: Repository: https://github.com/apache/kylin
Blast Radius: 0.0

Affected Packages

maven:org.apache.kylin:kylin
Dependent packages: 2
Dependent repositories: 1
Downloads:
Affected Version Ranges: < 4.0.1
Fixed in: 4.0.1
All affected versions: 1.3.0, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.0, 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 4.0.0
All unaffected versions: 4.0.1, 4.0.2, 4.0.3, 4.0.4