Vulnerability Description
Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Kylin | >= 2.3.0, <= 2.3.2 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b508656
- https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480f
- https://lists.apache.org/thread.html/rc574fef23740522f62ab3bbda4f6171be98aa7a25fMailing ListVendor Advisory
- https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b508656
- https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480f
- https://lists.apache.org/thread.html/rc574fef23740522f62ab3bbda4f6171be98aa7a25fMailing ListVendor Advisory
FAQ
What is CVE-2020-1937?
CVE-2020-1937 is a vulnerability with a CVSS score of 8.8 (HIGH). Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
How severe is CVE-2020-1937?
CVE-2020-1937 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-1937?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Kylin.