CVE-2020-1956
HIGH KEV NUCLEIApache Kylin < 2.3.2 - OS Command Injection
Title source: ruleDescription
Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
Exploits (1)
Nuclei Templates (1)
Apache Kylin 3.0.1 - Command Injection Vulnerability
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.favicon.hash:-186961397
FOFA:
icon_hash=-186961397
References (9)
Scores
CVSS v3
8.8
EPSS
0.9388
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-03-25
VulnCheck KEV
2020-10-14
InTheWild.io
2022-03-25
ENISA EUVD
EUVD-2020-0557
CWE
CWE-78
Status
published
Products (6)
apache/kylin
2.4.0
apache/kylin
2.4.1
apache/kylin
3.0.0 (4 CPE variants)
apache/kylin
3.0.1
apache/kylin
2.3.0 - 2.3.2
org.apache.kylin/kylin-core-common
0 - 2.6.6Maven
Published
May 22, 2020
KEV Added
Mar 25, 2022
Tracked Since
Feb 18, 2026