Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Kylin. If an attacker gets access to Kylin's system or project admin permission, the JDBC connection configuration maybe altered to execute arbitrary code from the remote. You are fine as long as the Kylin's system and project admin access is well protected. This issue affects Apache Kylin: from 4.0.0 through 5.0.1. Users are recommended to upgrade to version 5.0.2 or above, which fixes the issue.
History

Fri, 11 Apr 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache kylin
CPEs cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache kylin

Thu, 27 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 27 Mar 2025 16:45:00 +0000

Type Values Removed Values Added
References

Thu, 27 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Description Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Kylin. If an attacker gets access to Kylin's system or project admin permission, the JDBC connection configuration maybe altered to execute arbitrary code from the remote. You are fine as long as the Kylin's system and project admin access is well protected. This issue affects Apache Kylin: from 4.0.0 through 5.0.1. Users are recommended to upgrade to version 5.0.2 or above, which fixes the issue.
Title Apache Kylin: The remote code execution via jdbc url
Weaknesses CWE-94
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-03-27T17:56:13.192Z

Reserved: 2025-03-15T14:55:12.816Z

Link: CVE-2025-30067

cve-icon Vulnrichment

Updated: 2025-03-27T16:04:17.436Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-27T15:16:02.033

Modified: 2025-04-11T18:06:34.633

Link: CVE-2025-30067

cve-icon Redhat

No data.