In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r | Mailing List Patch Vendor Advisory |
https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r | Mailing List Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 07:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r - Mailing List, Patch, Vendor Advisory |
07 Nov 2023, 03:53
Type | Values Removed | Values Added |
---|---|---|
Summary | In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf. |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2022-12-30 11:15
Updated : 2024-11-21 07:26
NVD link : CVE-2022-43396
Mitre link : CVE-2022-43396
CVE.ORG link : CVE-2022-43396
JSON object : View
Products Affected
apache
- kylin
CWE