Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
CVE-2021-31522
Summary
Kylin can receive user input and load any class through "Class.forName(...)". This issue affects Apache kylin-server-base versions prior to 3.1.3 and 4.0.x prior to 4.0.1 and kylin-stream-receiver versions through 3.1.3.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- NONE
- HIGH
- HIGH
CWE-470 - Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
The application uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.
References
Advisory Timeline
- Published