CVE-2022-43396

In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.
References
Link Resource
https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r Mailing List Patch Vendor Advisory
https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r Mailing List Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:26

Type Values Removed Values Added
References () https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r - Mailing List, Patch, Vendor Advisory () https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r - Mailing List, Patch, Vendor Advisory

07 Nov 2023, 03:53

Type Values Removed Values Added
Summary In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf. In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-77 NVD-CWE-Other

Information

Published : 2022-12-30 11:15

Updated : 2024-11-21 07:26


NVD link : CVE-2022-43396

Mitre link : CVE-2022-43396

CVE.ORG link : CVE-2022-43396


JSON object : View

Products Affected

apache

  • kylin