This is an automated email from the ASF dual-hosted git repository. xxyu pushed a commit to branch document in repository https://gitbox.apache.org/repos/asf/kylin.git
The following commit(s) were added to refs/heads/document by this push: new da4f13b Add new security issue in Kylin 3.1.0 da4f13b is described below commit da4f13bdda66539d6ef4bf4bca619dc763b49604 Author: xxyu <x...@apache.org> AuthorDate: Wed Jul 15 16:13:45 2020 +0800 Add new security issue in Kylin 3.1.0 CVE-2020-13925,CVE-2020-13926 --- website/_docs/security.md | 53 +++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 53 insertions(+) diff --git a/website/_docs/security.md b/website/_docs/security.md index 2a87c9a..56b77f2 100644 --- a/website/_docs/security.md +++ b/website/_docs/security.md @@ -5,6 +5,59 @@ categories: docs permalink: /docs/security.html --- +### [CVE-2020-13926](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13926) + +__Severity__ + +Important + +__Vendor__ + +The Apache Software Foundation + +__Versions Affected__ + +Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1 3.0.2 + +__Description__ + +Kylin concatenates and executes some Hive SQL statements in Hive CLI or beeline when building new segments; some parts of the SQL are from system configurations, while the configuration can be overwritten by certain rest API, which make SQL injection attack is possible. + +__Mitigation__ + +Users of all previous versions after 2.0 should upgrade to 3.1.0. + +__Credit__ + +We would like to thank Rupeng Wang from Kyligence for reporting and fix this issue. + + +### [CVE-2020-13925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13925) + +__Severity__ + +Important + +__Vendor__ + +The Apache Software Foundation + +__Versions Affected__ + +Kylin 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1 3.0.2 + +__Description__ + +Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers have the possibility to execute OS command remotely. + +__Mitigation__ + +Users of all previous versions after 2.3 should upgrade to 3.1.0. + +__Credit__ + +We would like to thank Clancey <clanc...@protonmail.com> for reporting this issue. + ### [CVE-2020-1937](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1937) Apache Kylin SQL injection vulnerability