Apache.Kylin.getSparkSubmitCmd.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in Apache Software Foundation Kylin.
The vulnerability is due to the cube configuration item \"kylin.engine.spark-cmd\" allowing attackers to set and execute arbitrary commands when building cubes. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary command execution under the security context of the user running the application.
Affected Products
Apache Software Foundation Kylin 4.0.2 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://seclists.org/oss-sec/2022/q4/264
Version Updates
Date | Version | Detail |
---|---|---|
2023-03-15 | 0.00344 |