CVE Vulnerabilities

CVE-2021-31522

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Published: Jan 06, 2022 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Kylin can receive user input and load any class through Class.forName(…). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

Weakness

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Affected Software

NameVendorStart VersionEnd Version
KylinApache2.0.0 (including)2.6.6 (including)
KylinApache3.0.0 (including)3.1.3 (excluding)
KylinApache4.0.0 (including)4.0.0 (including)
KylinApache4.0.0-alpha (including)4.0.0-alpha (including)
KylinApache4.0.0-beta (including)4.0.0-beta (including)

Potential Mitigations

References