CVE Vulnerabilities

CVE-2021-31522

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Published: Jan 06, 2022 | Modified: Jan 12, 2022
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

Kylin can receive user input and load any class through Class.forName(…). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

Weakness

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Affected Software

Name Vendor Start Version End Version
Kylin Apache 2.0.0 (including) 2.6.6 (including)
Kylin Apache 3.0.0 (including) 3.1.3 (excluding)
Kylin Apache 4.0.0 (including) 4.0.0 (including)
Kylin Apache 4.0.0-alpha (including) 4.0.0-alpha (including)
Kylin Apache 4.0.0-beta (including) 4.0.0-beta (including)

Potential Mitigations

References