Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
2020-05-22T14:15:11.840
2025-10-23T14:48:35.523
Analyzed
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | apache | kylin | ≤ 2.3.2 | Yes |
| Application | apache | kylin | ≤ 2.5.2 | Yes |
| Application | apache | kylin | ≤ 2.6.5 | Yes |
| Application | apache | kylin | 2.4.0 | Yes |
| Application | apache | kylin | 2.4.1 | Yes |
| Application | apache | kylin | 3.0.0 | Yes |
| Application | apache | kylin | 3.0.0 | Yes |
| Application | apache | kylin | 3.0.0 | Yes |
| Application | apache | kylin | 3.0.0 | Yes |
| Application | apache | kylin | 3.0.1 | Yes |