|
Message-ID: <7667fcae.47cc.17e2f40370d.Coremail.xxyu@apache.org> Date: Thu, 6 Jan 2022 19:57:24 +0800 (CST) From: "Xiaoxiang Yu" <xxyu@...che.org> To: oss-security@...ts.openwall.com Cc: jincsheng@...il.com Subject: CVE-2021-36774: Apache Kylin: Mysql JDBC Connector Deserialize RCE Severity: moderate Description: Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions. Mitigation: Users of Kylin 2.x & Kylin 3.x should upgrade to 3.1.3 or apply patch https://github.com/apache/kylin/pull/1694. Credit: jinchen sheng -- Best wishes to you ! From :Xiaoxiang Yu
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.