This is an automated email from the ASF dual-hosted git repository.
aajisaka pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/kyuubi-website.git
The following commit(s) were added to refs/heads/master by this push:
new 5081bc7 Add CVE-2025-66518 description
5081bc7 is described below
commit 5081bc7d53f644d52ac14501fc5e1575873dd19c
Author: Akira Ajisaka <[email protected]>
AuthorDate: Mon Jan 5 14:20:45 2026 +0900
Add CVE-2025-66518 description
---
src/en/cve_list.md | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 51 insertions(+)
diff --git a/src/en/cve_list.md b/src/en/cve_list.md
new file mode 100644
index 0000000..5f9852f
--- /dev/null
+++ b/src/en/cve_list.md
@@ -0,0 +1,51 @@
+---
+title: Apache Kyuubi CVE List
+menu:
+ main:
+ name: "Published CVEs"
+ parent: "community"
+---
+<!---
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License. See accompanying LICENSE file.
+-->
+
+This page lists security fixes that the Kyuubi PMC felt warranted a CVE. If
you think something is missing from this list or if you think the set of
impacted or fixed versions is incomplete then please ask on [email protected].
+
+CVEs are presented in most-recent-first order of announcement.
+
+<!-- These should be sorted as most-recent-first. Please copy this template
and fill in as needed.
+
+##
[CVE-YYYY-XXXX](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-YYYY-XXXX)
Short Description
+
+One paragraph summary goes here. Don't need nuts-and-bolts detail, just enough
for a reader to guage applicability to their deployment.
+
+- **Versions affected**:
+- **Fixed versions**:
+- **Impact**:
+- **Reporter**:
+- **Reported Date**:
+- **Issue Announced**:
+-->
+
+##
[CVE-2025-66518](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66518)
Unauthorized directory access due to missing path normalization
+
+Any client who can access to Apache Kyuubi Server via Kyuubi frontend
protocols can bypass server-side config
+`kyuubi.session.local.dir.allow.list` and use local files which are not listed
in the config.
+
+- **Versions affected**: 1.6.0 to 1.10.2
+- **Fixed versions**: 1.10.3
+- **Impact**: privilege escalation
+- **Reporter**: Hiroki Egawa
+- **Reported Date**: 2025/11/21
+- **Issue Announced**: 2026/01/05
([dev@kyuubi](https://lists.apache.org/thread/xp460bwbyzdhho34ljd4nchyt2fmhodl))
+