Server-Side Request Forgery in Apache Kylin
Moderate severity
GitHub Reviewed
Published
Jan 8, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Jan 6, 2022
Reviewed
Jan 7, 2022
Published to the GitHub Advisory Database
Jan 8, 2022
Last updated
Feb 3, 2023
All request mappings in
StreamingCoordinatorController.java
handling/kylin/api/streaming_coordinator/*
REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.References