[ 
https://issues.apache.org/jira/browse/KYLIN-5994?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17928761#comment-17928761
 ] 

ASF subversion and git services commented on KYLIN-5994:
--------------------------------------------------------

Commit 000e328bb200b2b20c631b3d808860ac865768ca in kylin's branch 
refs/heads/kylin5 from Yinghao Lin
[ https://gitbox.apache.org/repos/asf?p=kylin.git;h=000e328bb2 ]

KYLIN-5994 Fix JDBC source config remote code execution (#2252)



> JDBC remote code execution vulnerability
> ----------------------------------------
>
>                 Key: KYLIN-5994
>                 URL: https://issues.apache.org/jira/browse/KYLIN-5994
>             Project: Kylin
>          Issue Type: Bug
>          Components: RDBMS Source
>    Affects Versions: 5.0.0
>            Reporter: Yinghao Lin
>            Priority: Major
>             Fix For: 5.0.1
>
>
> There is a vulnerability on adding jdbc data source with unchecked jdbc url 
> which may cause kylin server connect to a malicious remote server and get 
> unexpected result with code execution script invoked. (from Pho3n1x)



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to