René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

166 lines
5.2 KiB
JSON

{
"id": "CVE-2020-1937",
"sourceIdentifier": "security@apache.org",
"published": "2020-02-24T21:15:16.767",
"lastModified": "2021-12-30T20:56:19.593",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries."
},
{
"lang": "es",
"value": "Kylin presenta algunas apis restful que concatenar\u00e1n los SQL con la cadena de entrada del usuario, es probable que un usuario sea capaz de ejecutar consultas maliciosas de la base de datos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.3.0",
"versionEndIncluding": "2.3.2",
"matchCriteriaId": "656B4A80-45A1-4F86-B7C9-349647BEC04C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.4.0",
"versionEndIncluding": "2.4.1",
"matchCriteriaId": "E99A6DB5-2EC4-4587-B8FF-5A252AC94724"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.5.0",
"versionEndIncluding": "2.5.2",
"matchCriteriaId": "FAEF2809-48A1-4CE3-B840-252F138A21CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.0",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "1CC9157A-8552-44A4-828B-F0327E97203D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kylin:3.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "E602D518-53D4-4259-8A9C-443249654004"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kylin:3.0.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "E6ABDFCF-11C3-46BC-8CB2-58BE2CEAC1B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kylin:3.0.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "8E21E9E3-C9B8-4313-8FD2-99DA1C6833D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kylin:3.0.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "1950EE02-DCE7-4F08-8F4B-55AD8522762C"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread.html/rc574fef23740522f62ab3bbda4f6171be98aa7a25f3f54be143a80a8%40%3Cuser.kylin.apache.org%3E",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}