CVE-2020-13926

Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible. Users of all previous versions after 2.0 should upgrade to 3.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'name': '[kylin-commits] 20200715 svn commit: r1879879 - in /kylin/site: docs/security.html feed.xml', 'tags': ['Exploit', 'Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf%40%3Ccommits.kylin.apache.org%3E -

Information

Published : 2020-07-14 13:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-13926

Mitre link : CVE-2020-13926

CVE.ORG link : CVE-2020-13926


JSON object : View

Products Affected

apache

  • kylin
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')