Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-1956


Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.


Published

2020-05-22T14:15:11.840

Last Modified

2025-10-23T14:48:35.523

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-78
  • Type: Secondary
    CWE-78

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache kylin ≤ 2.3.2 Yes
Application apache kylin ≤ 2.5.2 Yes
Application apache kylin ≤ 2.6.5 Yes
Application apache kylin 2.4.0 Yes
Application apache kylin 2.4.1 Yes
Application apache kylin 3.0.0 Yes
Application apache kylin 3.0.0 Yes
Application apache kylin 3.0.0 Yes
Application apache kylin 3.0.0 Yes
Application apache kylin 3.0.1 Yes

References