Description
Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin's configuration information without any authentication, so it is dangerous because some confidential information entries will be disclosed to everyone.
Published: 2020-10-19
Score: 5.3 Medium
EPSS: 93.5% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2hpg-vwqj-6h6w Authentication bypass in Apache Kylin
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T12:32:14.371Z

Reserved: 2020-06-08T00:00:00.000Z

Link: CVE-2020-13937

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-19T21:15:12.623

Modified: 2024-11-21T05:02:11.323

Link: CVE-2020-13937

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses