GHSA-29m8-wh9p-5wc4

Suggest an improvement
Source
https://github.com/advisories/GHSA-29m8-wh9p-5wc4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-29m8-wh9p-5wc4/GHSA-29m8-wh9p-5wc4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-29m8-wh9p-5wc4
Aliases
  • CVE-2025-30067
Published
2025-03-27T15:31:14Z
Modified
2025-03-27T18:48:50.547924Z
Severity
  • 2.1 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N CVSS Calculator
Summary
Apache Kylin Code Injection via JDBC Configuration Alteration
Details

Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Kylin. If an attacker gets access to Kylin's system or project admin permission, the JDBC connection configuration maybe altered to execute arbitrary code from the remote. You are fine as long as the Kylin's system and project admin access is well protected.

This issue affects Apache Kylin: from 4.0.0 through 5.0.1.

Users are recommended to upgrade to version 5.0.2 or above, which fixes the issue.

Database specific
{
    "nvd_published_at": "2025-03-27T15:16:02Z",
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2025-03-27T18:18:39Z"
}
References

Affected packages

Maven / org.apache.kylin:kylin

Package

Name
org.apache.kylin:kylin
View open source insights on deps.dev
Purl
pkg:maven/org.apache.kylin/kylin

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0
Fixed
5.0.2

Affected versions

4.*

4.0.0
4.0.1
4.0.2
4.0.3
4.0.4

5.*

5.0.0-alpha
5.0.0-beta
5.0.0