#VU29726 OS Command Injection in Apache Kylin - CVE-2020-13925

 

#VU29726 OS Command Injection in Apache Kylin - CVE-2020-13925

Published: July 14, 2020 / Updated: July 20, 2020


Vulnerability identifier: #VU29726
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2020-13925
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Apache Kylin
Software vendor:
Apache Foundation

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when processing API requests. A remote authenticated user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links