Severity: important Description:
In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf. Work Arounds: Users of Kylin 2.x & Kylin 3.x & 4.x should upgrade to 4.0.3 or apply patch https://github.com/apache/kylin/pull/2011 https://github.com/apache/kylin/pull/2011 Credit: Yasax1 Li <pp1ove....@gmail.com> (finder) References: https://lists.apache.org/thread/o53vqxjdd9q731bwqpgcqyzx9r716qwx https://kylin.apache.org/ https://www.cve.org/CVERecord?id=CVE-2022-43396