We found results for “”
CVE-2022-43396
Good to know:
Date: December 30, 2022
In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.
Language: Java
Severity Score
Severity Score
Weakness Type (CWE)
Command Injection
CWE-77Top Fix
Upgrade Version
Upgrade to version org.apache.kylin:kylin-core-common:4.0.3;org.apache.kylin:kylin-server-base:4.0.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |