Description
Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/12/30/1
https://lists.apache.org/thread/07mnn9c7o314wrhrwjr10w9j5s82voj4
Related Vulnerabilities
CVE-2022-47105 Vulnerability in maven package org.jeecgframework.boot:jeecg-module-system
CVE-2023-33246 Vulnerability in maven package org.apache.rocketmq:rocketmq-broker
CVE-2020-2109 Vulnerability in maven package org.jenkins-ci.plugins.workflow:workflow-cps
CVE-2019-0192 Vulnerability in maven package org.apache.solr:solr-core
CVE-2023-50779 Vulnerability in maven package com.cloudtp.jenkins:paaslane-estimate