CVE-2020-1956

Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
apacheCNA
---
---
CVEADP
---
---
CISA-ADPADP
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
apachekylin
2.3.0 ≤
𝑥
≤ 2.3.2
apachekylin
2.5.0 ≤
𝑥
≤ 2.5.2
apachekylin
2.6.0 ≤
𝑥
≤ 2.6.5
apachekylin
2.4.0
apachekylin
2.4.1
apachekylin
3.0.0
apachekylin
3.0.0:alpha
apachekylin
3.0.0:alpha2
apachekylin
3.0.0:beta
apachekylin
3.0.1
𝑥
= Vulnerable software versions
References