You are viewing a plain text version of this content. The canonical link for it is here.
Posted to user@kylin.apache.org by Xiaoxiang Yu <xx...@apache.org> on 2022/01/06 11:51:09 UTC
CVE-2021-31522: Apache Kylin unsafe class loading
Severity: moderate
Description:
Kylin can receive user input and load any class through Class.forName(...).
This issue affects Apache Kylin Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
Mitigation:
Users of Kylin 2.x & Kylin 3.x should upgrade to 3.1.3 or apply patch https://github.com/apache/kylin/pull/1695.
Users of Kylin 4.x should upgrade to 4.0.1 or apply patch https://github.com/apache/kylin/pull/1763.
Credit:
bo yu--
Best wishes to you !
From :Xiaoxiang Yu