All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2022-01-06T12:35:17

Updated: 2024-08-03T21:26:10.756Z

Reserved: 2021-02-26T00:00:00

Link: CVE-2021-27738

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2022-01-06T13:15:07.967

Modified: 2022-01-13T18:04:21.017

Link: CVE-2021-27738

cve-icon Redhat

No data.