Skip to main content

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

CVE-2021-31522

Severity High
Score 9.8/10

Summary

Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache kylin-server-base module versions prior to 3.1.3 and 4.0.x prior to 4.0.1 and kylin-stream-receiver module versions through 3.1.3.

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • NONE
  • NONE
  • HIGH
  • HIGH

CWE-470 - Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

The application uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Advisory Timeline

  • Published