Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
CVE-2021-31522
Summary
Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache kylin-server-base module versions prior to 3.1.3 and 4.0.x prior to 4.0.1 and kylin-stream-receiver module versions through 3.1.3.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- NONE
- HIGH
- HIGH
CWE-470 - Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
The application uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.
References
Advisory Timeline
- Published