Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wrx7-qgmj-mf2q

Опубликовано: 08 янв. 2022
Источник: github
Github: Прошло ревью

Описание

Server-Side Request Forgery in Apache Kylin

All request mappings in StreamingCoordinatorController.java handling /kylin/api/streaming_coordinator/* REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.

Пакеты

Наименование

org.apache.kylin:kylin

maven
Затронутые версииВерсия исправления

< 3.1.3

3.1.3

EPSS

Процентиль: 84%
0.02184
Низкий

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 7.5
nvd
около 4 лет назад

All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.

CVSS3: 7.5
fstec
около 4 лет назад

Уязвимость компонента StreamingCoordinatorController.java платформы обработки данных Kylin, позволяющая нарушителю выполнять атаки SSRF

EPSS

Процентиль: 84%
0.02184
Низкий

Дефекты

CWE-918