Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. Through a kylin server, an attacker may forge a request to invoke /kylin/api/xxx/diag api on another internal host and possibly get leaked information. There are two preconditions: 1) The attacker has got admin access to a kylin server; 2) Another internal host has the /kylin/api/xxx/diag api
endpoint open for service.
This issue affects Apache Kylin: from 5.0.0 through
5.0.1.
Users are recommended to upgrade to version 5.0.2, which fixes the issue.
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kylin | Apache | 5.0.0 (including) | 5.0.2 (excluding) |