GHSA-wrx7-qgmj-mf2q

Suggest an improvement
Source
https://github.com/advisories/GHSA-wrx7-qgmj-mf2q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-wrx7-qgmj-mf2q/GHSA-wrx7-qgmj-mf2q.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-wrx7-qgmj-mf2q
Aliases
Published
2022-01-08T00:43:04Z
Modified
2023-11-01T04:54:55.972995Z
Summary
Server-Side Request Forgery in Apache Kylin
Details

All request mappings in StreamingCoordinatorController.java handling /kylin/api/streaming_coordinator/* REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.

Database specific
{
    "nvd_published_at": "2022-01-06T13:15:00Z",
    "github_reviewed_at": "2022-01-07T23:16:38Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-918"
    ]
}
References

Affected packages

Maven / org.apache.kylin:kylin

Package

Name
org.apache.kylin:kylin
View open source insights on deps.dev
Purl
pkg:maven/org.apache.kylin/kylin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.3

Affected versions

0.*

0.7.1-incubating
0.7.2-incubating

1.*

1.0-incubating
1.1-incubating
1.1.1-incubating
1.2
1.3.0
1.5.0
1.5.1
1.5.2
1.5.2.1
1.5.3
1.5.4
1.5.4.1
1.6.0

2.*

2.0.0
2.1.0
2.2.0
2.3.0
2.3.1
2.3.2
2.4.0
2.4.1
2.5.0
2.5.1
2.5.2
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6

3.*

3.0.0-alpha
3.0.0-alpha2
3.0.0
3.0.1
3.0.2
3.1.0
3.1.1
3.1.2