QID 730430

Date Published: 2022-04-08

QID 730430: Apache Kylin Command Injection Vulnerability

Apache Kylin is an open-source distributed Analytical Data Warehouse from Apache Software Foundation (ASF). It is designed to provide SQL interface and multi-dimensional analysis (OLAP) on Hadoop/Spark to support extremely large datasets.

CVE-2020-1956: Some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation. Affected Versions:
Apache Kylin versions from 2.3.0 to 2.3.2
Apache Kylin versions from 2.4.0 to 2.4.1
Apache Kylin versions from 2.5.0 to 2.5.2
Apache Kylin versions from 2.6.0 to 2.6.5
Apache Kylin versions 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1

QID Detection Logic (Unauthenticated):
The QID checks for vulnerable versions of Apache Kylin by sending a GET request to "/kylin/api/admin/version" endpoint.

Successful exploitation of this vulnerability may allow an authenticated remote attacker to execute arbitrary commands on the affected targets.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution

    Customers are advised to upgrade to Apache Kylin 3.0.2 or 2.6.6 or later. For further information please refer to Apache Kylin Security Advisory.Workaround:
    Set "kylin.tool.auto-migrate-cube.enabled" to false to disable command execution.

    Vendor References

    CVEs related to QID 730430

    Software Advisories
    Advisory ID Software Component Link
    Apache Kylin Security Advisory URL Logo lists.apache.org/thread/npo8mtv0qkbfdfz8yg9vhl2lg959q1zy