Vulnerability Details : CVE-2021-45456
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.
Products affected by CVE-2021-45456
- cpe:2.3:a:apache:kylin:4.0.0:alpha:*:*:*:*:*:*
- cpe:2.3:a:apache:kylin:4.0.0:-:*:*:*:*:*:*
- cpe:2.3:a:apache:kylin:4.0.0:beta:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-45456
75.85%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-45456
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2021-45456
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-45456
-
https://lists.apache.org/thread/70fkf9w1swt2cqdcz13rwfjvblw1fcpf
CVE-2021-45456: Apache Kylin: Command injection-Apache Mail ArchivesMailing List;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2022/01/06/1
oss-security - CVE-2021-45456: Apache Kylin: Command injectionMailing List;Third Party Advisory
Jump to