TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2020-1956

HIGHCISA KEV
8.8

Beschreibung

Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.

CVE Details

CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht5/22/2020
Zuletzt geandert10/23/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerApache
ProduktKylin
SchwachstellennameApache Kylin OS Command Injection Vulnerability
KEV Aufnahmedatum2022-03-25
Behebungsfrist2022-04-15
Ransomware-NutzungUnknown

Betroffene Produkte

apache:kylin

Schwachen (CWE)

CWE-78CWE-78

Referenzen

http://www.openwall.com/lists/oss-security/2020/07/14/1(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.