SQL Injection Vulnerability in Apache Kylin Affects Multiple Versions
CVE-2020-13926
9.8CRITICAL
Summary
The vulnerability arises in Apache Kylin when it concatenates and executes Hadoop Query Language (HQL) in Hive Command Line Interface (CLI) or Beeline. The issue stems from system configurations that can be altered via certain REST API calls, allowing attackers to inject malicious SQL code. This flaw affects users running versions of Apache Kylin prior to 3.1.0, and it is recommended that they upgrade to mitigate risks associated with this vulnerability.
Affected Version(s)
Apache Kylin Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1 3.0.2
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved