HTTP: Apache Kylin REST API Command Injection

This signature detects attempts to exploit a known vulnerability against Apache Kylin REST API. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.

Affected Products

Apache kylin

Short Name
HTTP:APACHE:KYLIN-REST-CMD-INJ
Severity
Critical
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
API Apache CVE-2020-13925 CVE-2020-1956 CVE-2021-45456 Command Injection Kylin REST
Release Date
07/07/2020
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3693
False Positive
Unknown
Vendors

Apache

CVSS Score

7.5

9.0

10.0

Found a potential security threat?