Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
GHSA-gprm-xqrc-c2j3 | Command Injection in Kylin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 21 Oct 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 21 Oct 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 06 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-10-21T19:54:30.612Z
Reserved: 2019-12-02T00:00:00.000Z
Link: CVE-2020-1956

Updated: 2024-08-04T06:54:00.299Z

Status : Modified
Published: 2020-05-22T14:15:11.840
Modified: 2025-10-21T20:17:56.417
Link: CVE-2020-1956

No data.

No data.