Apache Kylin: Insufficiently protected credentials in config file
CVE-2023-29055
What is CVE-2023-29055?
In certain versions of Apache Kylin, a vulnerability exists within the Server Config web interface that inadvertently exposes the contents of the 'kylin.properties' file. This file may contain sensitive information such as server-side credentials, which can be compromised if the Kylin service runs over HTTP or other unencrypted protocols. Network attackers can utilize packet sniffing techniques to intercept the transmitted payload, leading to unauthorized access to sensitive configuration data. To mitigate this risk, it is crucial to enforce HTTPS for encrypted communication, refrain from storing credentials in 'kylin.properties' in plaintext, implement robust network firewalls to restrict access to internal servers, and upgrade to Apache Kylin 4.0.4 or later to ensure that sensitive information is properly filtered from the web interface.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Apache Kylin 2.0.0 <= 4.0.3
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved