Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <7667fcae.47cc.17e2f40370d.Coremail.xxyu@apache.org>
Date: Thu, 6 Jan 2022 19:57:24 +0800 (CST)
From: "Xiaoxiang Yu" <xxyu@...che.org>
To: oss-security@...ts.openwall.com
Cc: jincsheng@...il.com
Subject: CVE-2021-36774: Apache Kylin: Mysql JDBC Connector Deserialize RCE

Severity: moderate

Description:

Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. 
This issue affects Apache Kylin Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions.

Mitigation:

Users of Kylin 2.x & Kylin 3.x should upgrade to 3.1.3 or apply patch https://github.com/apache/kylin/pull/1694.

Credit:

jinchen sheng --

Best wishes to you ! 
From :Xiaoxiang Yu

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.