You are viewing a plain text version of this content. The canonical link for it is here.
Posted to user@kylin.apache.org by Xiaoxiang Yu <xx...@apache.org> on 2022/01/06 11:51:09 UTC

CVE-2021-31522: Apache Kylin unsafe class loading

Severity: moderate

Description:

Kylin can receive user input and load any class through Class.forName(...).
This issue affects Apache Kylin Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

Mitigation:

Users of Kylin 2.x & Kylin 3.x should upgrade to 3.1.3 or apply patch https://github.com/apache/kylin/pull/1695.
Users of Kylin 4.x should upgrade to 4.0.1 or apply patch https://github.com/apache/kylin/pull/1763.

Credit:

bo yu--

Best wishes to you ! 
From :Xiaoxiang Yu