Skip to main content

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

CVE-2021-31522

Severity High
Score 9.8/10

Summary

Kylin can receive user input and load any class through "Class.forName(...)". This issue affects Apache kylin-server-base versions prior to 3.1.3 and 4.0.x prior to 4.0.1 and kylin-stream-receiver versions through 3.1.3.

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • NONE
  • NONE
  • HIGH
  • HIGH

CWE-470 - Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

The application uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Advisory Timeline

  • Published