| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09" |
| }, |
| "title": "Command injection by Useless configuration", |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "description": "Command injection", |
| "lang": "en" |
| } |
| ] |
| } |
| ], |
| "source": { |
| "discovery": "UNKNOWN" |
| }, |
| "affected": [ |
| { |
| "vendor": "Apache Software Foundation", |
| "product": "Apache Kylin", |
| "versions": [ |
| { |
| "status": "affected", |
| "version": "Apache Kylin 4", |
| "lessThanOrEqual": "4.0.2", |
| "versionType": "semver" |
| } |
| ], |
| "defaultStatus": "unaffected" |
| } |
| ], |
| "descriptions": [ |
| { |
| "value": "In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the\u00a0kylin.engine.spark-cmd\u00a0parameter of conf.", |
| "lang": "en", |
| "supportingMedia": [ |
| { |
| "type": "text/html", |
| "base64": false, |
| "value": "In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf." |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r", |
| "tags": [ |
| "vendor-advisory" |
| ] |
| } |
| ], |
| "metrics": [ |
| { |
| "other": { |
| "type": "Textual description of severity", |
| "content": { |
| "text": "important" |
| } |
| } |
| } |
| ], |
| "workarounds": [ |
| { |
| "lang": "en", |
| "value": "Users of Kylin 2.x & Kylin 3.x & 4.x should upgrade to 4.0.3 or apply patch\u00a0 https://github.com/apache/kylin/pull/2011 https://github.com/apache/kylin/pull/2011 \n", |
| "supportingMedia": [ |
| { |
| "type": "text/html", |
| "base64": false, |
| "value": "Users of Kylin 2.x & Kylin 3.x & 4.x should upgrade to 4.0.3 or apply patch <a target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/apache/kylin/pull/2011\">https://github.com/apache/kylin/pull/2011</a><br>" |
| } |
| ] |
| } |
| ], |
| "credits": [ |
| { |
| "lang": "en", |
| "value": "Yasax1 Li <pp1ove.lit@gmail.com>", |
| "type": "finder" |
| } |
| ], |
| "x_generator": { |
| "engine": "Vulnogram 0.1.0-dev" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "cveId": "CVE-2022-43396", |
| "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", |
| "serial": 1, |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |