5.0.0
8 years ago
3 months ago
Known vulnerabilities in the org.apache.kylin:kylin-core-common package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.kylin:kylin-core-common is a package part of Apache Kylin. Affected versions of this package are vulnerable to Insufficiently Protected Credentials via the Server Config web interface which displays the content of the Note: This is only exploitable if the kylin service is accessible to external attackers and is not protected by HTTPS or network firewalls. How to fix Insufficiently Protected Credentials? Upgrade | [2.0.0,4.0.4) |
org.apache.kylin:kylin-core-common is a package part of Apache Kylin. Affected versions of this package are vulnerable to Command Injection due to an incomplete fix for CVE-2022-24697. The blacklist is used to filter user input commands, but there is a risk of being bypassed. The user can control the command by controlling the How to fix Command Injection? Upgrade | [2.0.0,4.0.3) |
org.apache.kylin:kylin-core-common is a package part of Apache Kylin. Affected versions of this package are vulnerable to Remote Code Execution (RCE) in cube designer function when overwriting system parameters in the configuration overwrites menu. An attacker can exploit this vulnerability by closing the single quotation marks around the parameter value of How to fix Remote Code Execution (RCE)? Upgrade | [2.0.0,4.0.2) |
org.apache.kylin:kylin-core-common is a package part of Apache Kylin. Affected versions of this package are vulnerable to Insecure Encryption. If users use class How to fix Insecure Encryption? Upgrade | [,3.1.3)[4.0.0-alpha,4.0.1) |
org.apache.kylin:kylin-core-common is a package part of Apache Kylin. Affected versions of this package are vulnerable to Arbitrary Code Execution as it allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. How to fix Arbitrary Code Execution? Upgrade | [,3.1.3) |