In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r | Mailing List Patch Vendor Advisory |
Configurations
History
07 Nov 2023, 03:53
Type | Values Removed | Values Added |
---|---|---|
Summary | In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf. |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
09 Jan 2023, 18:02
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 | |
CPE | cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* | |
References | (MISC) https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r - Mailing List, Patch, Vendor Advisory | |
First Time |
Apache
Apache kylin |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
30 Dec 2022, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-30 11:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-43396
Mitre link : CVE-2022-43396
CVE.ORG link : CVE-2022-43396
JSON object : View
Products Affected
apache
- kylin
CWE