Apache.Kylin.REST.API.DiagnosisService.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit a Command Injection Vulnerability in Apache Software Foundation Kylin.
The vulnerability is due to insufficient validation of user-supplied input to the diag REST API endpoint. A remote, authenticated attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the target server. Successful exploitation of this vulnerability can lead to arbitrary code execution in the context of user running the application.

affected-products-logoAffected Products

Apache Software Foundation Kylin prior to 3.1.0

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://kylin.apache.org/docs/security.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-08-26 15.912 Default_action:pass:drop
2020-08-11 15.903