Apache.Kylin.getSparkSubmitCmd.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit a Command Injection Vulnerability in Apache Software Foundation Kylin.
The vulnerability is due to the cube configuration item \"kylin.engine.spark-cmd\" allowing attackers to set and execute arbitrary commands when building cubes. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary command execution under the security context of the user running the application.

affected-products-logoAffected Products

Apache Software Foundation Kylin 4.0.2 and prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://seclists.org/oss-sec/2022/q4/264

Version Updates

Date Version Detail
2023-03-15 0.00344

CVE References

CVE-2022-43396