← Voltar para CVEs
CVE-2021-45456
CRITICAL9.8
Descricao
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado1/6/2022
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
apache:kylin
Fraquezas (CWE)
CWE-77
Referencias
http://www.openwall.com/lists/oss-security/2022/01/06/1(security@apache.org)
https://lists.apache.org/thread/70fkf9w1swt2cqdcz13rwfjvblw1fcpf(security@apache.org)
http://www.openwall.com/lists/oss-security/2022/01/06/1(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread/70fkf9w1swt2cqdcz13rwfjvblw1fcpf(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.