Apache Kylin 2.3.x < 2.3.3 / 2.4.x < 2.4.2 / 2.5.x < 2.5.3 / 2.6.x < 2.6.6 / 3.x < 3.0.2 Command Injection (CVE-2020-1956)

high Nessus Plugin ID 186352

Synopsis

The application running on the remote host is affected by a command injection vulnerability.

Description

The instance of Apache Kylin running on the remote host is 2.3.x prior to 2.3.3, 2.4.x prior to 2.4.2, 2.5.x prior to 2.5.3, 2.6.x prior to 2.6.6 or 3.x prior to 3.0.2. Therefore, it is affected by a command injection vulnerability due to some restful APIs concatenating OS commands with user input strings. An authenticated, remote attacker with the MANAGEMENT or ADMIN permissions on any project can inject arbitrary system commands during Cube migration via the Kylin web interface.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache Kylin version 2.6.6, 3.0.2 or later or set kylin.tool.auto-migrate-cube.enabled to false.

See Also

http://www.nessus.org/u?3b0bbbae

https://kylin.apache.org/docs/security.html

https://nvd.nist.gov/vuln/detail/CVE-2020-1956

Plugin Details

Severity: High

ID: 186352

File Name: apache_kylin_CVE-2020-1956.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 11/28/2023

Updated: 11/28/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2020-1956

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:kylin

Required KB Items: installed_sw/Apache Kylin, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/20/2020

Vulnerability Publication Date: 5/20/2020

CISA Known Exploited Vulnerability Due Dates: 4/15/2022

Reference Information

CVE: CVE-2020-1956