Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. Through a kylin server, an attacker may forge a request to invoke "/kylin/api/xxx/diag" api on another internal host and possibly get leaked information. There are two preconditions: 1) The attacker has got admin access to a kylin server; 2) Another internal host has the "/kylin/api/xxx/diag" api
endpoint open for service.
This issue affects Apache Kylin: from 5.0.0 
through 
5.0.1.
Users are recommended to upgrade to version 5.0.2, which fixes the issue.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.apache.org/thread/1xxxtdfh9hzqsqgb1pd9grb8hvqdyc9x | Mailing List Vendor Advisory | 
| http://www.openwall.com/lists/oss-security/2025/03/27/5 | Mailing List Third Party Advisory | 
Configurations
                    History
                    01 Apr 2025, 15:44
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| References | () https://lists.apache.org/thread/1xxxtdfh9hzqsqgb1pd9grb8hvqdyc9x - Mailing List, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2025/03/27/5 - Mailing List, Third Party Advisory | |
| First Time | Apache Apache kylin | |
| CPE | cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* | 
27 Mar 2025, 18:17
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.5 | 
27 Mar 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
27 Mar 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-27 15:15
Updated : 2025-04-01 15:44
NVD link : CVE-2024-48944
Mitre link : CVE-2024-48944
CVE.ORG link : CVE-2024-48944
JSON object : View
Products Affected
                apache
- kylin
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
