{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-1956", "ASSIGNER": "security@apache.org", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Apache", "product": { "product_data": [ { "product_name": "Kylin", "version": { "version_data": [ { "version_value": "2.3.0" }, { "version_value": "<=2.6.5" }, { "version_value": "<=3.0.1" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Command Injection" } ] } ] }, "references": { "reference_data": [ { "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E", "url": "https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E" }, { "refsource": "MISC", "name": "https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706", "url": "https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706" }, { "refsource": "MLIST", "name": "[kylin-user] 20200713 [SECURITY][CVE-2020-13925] Apache Kylin command injection vulnerability", "url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E" }, { "refsource": "MLIST", "name": "[kylin-dev] 20200713 [SECURITY][CVE-2020-13925] Apache Kylin command injection vulnerability", "url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cdev.kylin.apache.org%3E" }, { "refsource": "MLIST", "name": "[kylin-commits] 20200713 svn commit: r1879845 - in /kylin/site: docs/security.html feed.xml", "url": "https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E" }, { "refsource": "MLIST", "name": "[announce] 20200713 [SECURITY][CVE-2020-13925] Apache Kylin command injection vulnerability", "url": "https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cannounce.apache.org%3E" }, { "refsource": "MLIST", "name": "[oss-security] 20200714 [SECURITY][CVE-2020-13925] Apache Kylin command injection vulnerability", "url": "http://www.openwall.com/lists/oss-security/2020/07/14/1" }, { "refsource": "MLIST", "name": "[kylin-commits] 20200715 svn commit: r1879879 - in /kylin/site: docs/security.html feed.xml", "url": "https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation." } ] } }