CVE-2020-1956

Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user...

Basic Information

CVE State
PUBLISHED
Reserved Date
December 02, 2019
Published Date
May 22, 2020
Last Updated
February 06, 2025
Vendor
Apache
Product
Kylin
Description
Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.

CVSS Scores

CVSS v3.1

8.8 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2022-03-25 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2021-07-08 00:58:07 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-03-25 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

b510/CVE-2020-1956

Type: github • Created: 2021-07-08 00:58:07 UTC • Stars: 0

CVE-2020-1956