In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r | Mailing List Patch Vendor Advisory | 
| https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r | Mailing List Patch Vendor Advisory | 
Configurations
                    History
                    11 Apr 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-184 | 
21 Nov 2024, 07:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r - Mailing List, Patch, Vendor Advisory | 
07 Nov 2023, 03:53
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf. | 
08 Aug 2023, 14:22
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | NVD-CWE-Other | 
Information
                Published : 2022-12-30 11:15
Updated : 2025-04-11 15:15
NVD link : CVE-2022-43396
Mitre link : CVE-2022-43396
CVE.ORG link : CVE-2022-43396
JSON object : View
Products Affected
                apache
- kylin
CWE
                