ghsa-29m8-wh9p-5wc4
Vulnerability from github
Published
2025-03-27 15:31
Modified
2025-03-27 18:18
Severity ?
VLAI Severity ?
Summary
Apache Kylin Code Injection via JDBC Configuration Alteration
Details
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Kylin. If an attacker gets access to Kylin's system or project admin permission, the JDBC connection configuration maybe altered to execute arbitrary code from the remote. You are fine as long as the Kylin's system and project admin access is well protected.
This issue affects Apache Kylin: from 4.0.0 through 5.0.1.
Users are recommended to upgrade to version 5.0.2 or above, which fixes the issue.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.kylin:kylin" }, "ranges": [ { "events": [ { "introduced": "4.0.0" }, { "fixed": "5.0.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-30067" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": true, "github_reviewed_at": "2025-03-27T18:18:39Z", "nvd_published_at": "2025-03-27T15:16:02Z", "severity": "LOW" }, "details": "Improper Control of Generation of Code (\u0027Code Injection\u0027) vulnerability in Apache Kylin. \nIf an attacker gets access to Kylin\u0027s system or project admin permission, the JDBC connection configuration maybe altered to execute arbitrary code from the remote. You are fine as long as the Kylin\u0027s system and project admin access is well protected.\n\nThis issue affects Apache Kylin: from 4.0.0 through 5.0.1.\n\nUsers are recommended to upgrade to version 5.0.2 or above, which fixes the issue.", "id": "GHSA-29m8-wh9p-5wc4", "modified": "2025-03-27T18:18:39Z", "published": "2025-03-27T15:31:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30067" }, { "type": "WEB", "url": "https://github.com/apache/kylin/commit/21d98f3ef29f71b50dacabbf039905f9f0f71b95" }, { "type": "PACKAGE", "url": "https://github.com/apache/kylin" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/KYLIN-5994" }, { "type": "WEB", "url": "https://lists.apache.org/thread/6j19pt8yoqfphf1lprtrzoqkvz1gwbnc" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", "type": "CVSS_V4" } ], "summary": "Apache Kylin Code Injection via JDBC Configuration Alteration" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…