Threat Encyclopedia
Apache.Kylin.runSparkSubmit.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in Apache Software Foundation Kylin.
The vulnerability is due to improper input validation when overwriting system parameters in cube configurations submitted to the server. A remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary command execution under the security context of the user running the vulnerable application.
Affected Products
Apache Software Foundation Kylin 2.x.x prior to 2.6.6
Apache Software Foundation Kylin 3.x.x prior to 3.1.3
Apache Software Foundation Kylin 4.x.x prior to 4.0.2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://lists.apache.org/thread/07mnn9c7o314wrhrwjr10w9j5s82voj4