Severity: moderate

Description:

Apache kylin checks the legitimacy of the project before executing some 
commands with the project name passed in by the user. There is a mismatch 
between what is being checked and what is being used as the shell command 
argument in DiagnosisService. This may cause an illegal project name to pass 
the check and perform the following steps, resulting in a command injection 
vulnerability.
This issue affects Apache Kylin 4.0.0.

Mitigation:

Users of Kylin 4.0.0 should upgrade to 4.0.1 or apply patch 
https://github.com/apache/kylin/pull/1781.

Credit:

Alvaro Munoz --

Best wishes to you ! 
From :Xiaoxiang Yu

Reply via email to