Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Kylin.
If an attacker gets access to Kylin's system or project admin permission, the JDBC connection configuration maybe altered to execute arbitrary code from the remote. You are fine as long as the Kylin's system and project admin access is well protected.
This issue affects Apache Kylin: from 4.0.0 through 5.0.1.
Users are recommended to upgrade to version 5.0.2 or above, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Apr 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache kylin |
|
CPEs | cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache kylin |
Thu, 27 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 27 Mar 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 27 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Kylin. If an attacker gets access to Kylin's system or project admin permission, the JDBC connection configuration maybe altered to execute arbitrary code from the remote. You are fine as long as the Kylin's system and project admin access is well protected. This issue affects Apache Kylin: from 4.0.0 through 5.0.1. Users are recommended to upgrade to version 5.0.2 or above, which fixes the issue. | |
Title | Apache Kylin: The remote code execution via jdbc url | |
Weaknesses | CWE-94 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-27T17:56:13.192Z
Reserved: 2025-03-15T14:55:12.816Z
Link: CVE-2025-30067

Updated: 2025-03-27T16:04:17.436Z

Status : Analyzed
Published: 2025-03-27T15:16:02.033
Modified: 2025-04-11T18:06:34.633
Link: CVE-2025-30067

No data.