CVE-2022-24697: Apache Kylin vulnerable to remote code execution
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.97239%
CWE
Published
7/6/2023
Updated
8/8/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.kylin:kylin-core-common | maven | < 4.0.2 | 4.0.2 |
| org.apache.kylin:kylin-spark-project | maven | < 4.0.2 | 4.0.2 |
| org.apache.kylin:kylin-server-base | maven | < 4.0.2 | 4.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs during Spark command construction where user-supplied configuration parameters (--conf) are directly embedded into the command string. The advisory mentions command injection via breaking out of single quotes around '--conf' values, indicating improper neutralization during command string assembly. The affected packages (kylin-spark-project) and CWE-77 pattern both point to command-building functions in Spark job execution logic. The subsequent CVE-2022-43396 and its patch (PR #2011) confirm that the initial fix in PR #1811 was insufficient, reinforcing that the core vulnerability resides in how Spark commands are constructed with user input.