Severity: important

Description:

In the fix for CVE-2022-24697, a blacklist is used to filter user input 
commands. But there is a risk of being bypassed. The user can control the 
command by controlling the kylin.engine.spark-cmd parameter of conf.

Work Arounds:

Users of Kylin 2.x & Kylin 3.x & 4.x should upgrade to 4.0.3 or apply patch  
https://github.com/apache/kylin/pull/2011 
https://github.com/apache/kylin/pull/2011

Credit:

Yasax1 Li <pp1ove....@gmail.com> (finder)

References:

https://lists.apache.org/thread/o53vqxjdd9q731bwqpgcqyzx9r716qwx
https://kylin.apache.org/
https://www.cve.org/CVERecord?id=CVE-2022-43396

Reply via email to