|
Message-ID: <47de7a15.47d0.17e2f40f9f3.Coremail.xxyu@apache.org> Date: Thu, 6 Jan 2022 19:58:14 +0800 (CST) From: "Xiaoxiang Yu" <xxyu@...che.org> To: oss-security@...ts.openwall.com Cc: forhaby0@...il.com Subject: CVE-2021-31522: Apache Kylin unsafe class loading Severity: moderate Description: Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions. Mitigation: Users of Kylin 2.x & Kylin 3.x should upgrade to 3.1.3 or apply patch https://github.com/apache/kylin/pull/1695. Users of Kylin 4.x should upgrade to 4.0.1 or apply patch https://github.com/apache/kylin/pull/1763. Credit: bo yu-- Best wishes to you ! From :Xiaoxiang Yu
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.