CVE-2020-1956

HIGH KEV NUCLEI

Apache Kylin < 2.3.2 - OS Command Injection

Title source: rule

Description

Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.

Exploits (1)

nomisec WORKING POC
by b510 · remote-auth
https://github.com/b510/CVE-2020-1956

Nuclei Templates (1)

Apache Kylin 3.0.1 - Command Injection Vulnerability
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.favicon.hash:-186961397
FOFA: icon_hash=-186961397

Scores

CVSS v3 8.8
EPSS 0.9388
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-03-25
VulnCheck KEV 2020-10-14
InTheWild.io 2022-03-25
ENISA EUVD EUVD-2020-0557
CWE
CWE-78
Status published
Products (6)
apache/kylin 2.4.0
apache/kylin 2.4.1
apache/kylin 3.0.0 (4 CPE variants)
apache/kylin 3.0.1
apache/kylin 2.3.0 - 2.3.2
org.apache.kylin/kylin-core-common 0 - 2.6.6Maven
Published May 22, 2020
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026