We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-48944

Apache Kylin: SSRF vulnerability in the diagnosis api



Description

Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. Through a kylin server, an attacker may forge a request to invoke "/kylin/api/xxx/diag" api on another internal host and possibly get leaked information. There are two preconditions: 1) The attacker has got admin access to a kylin server; 2) Another internal host has the "/kylin/api/xxx/diag" api endpoint open for service. This issue affects Apache Kylin: from 5.0.0 through 5.0.1. Users are recommended to upgrade to version 5.0.2, which fixes the issue.

Reserved 2024-10-09 | Published 2025-03-27 | Updated 2025-05-08 | Assigner apache

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unaffected

5.0.0
affected

Credits

Zevi <linzmgx@gmail.com> finder

References

lists.apache.org/thread/1xxxtdfh9hzqsqgb1pd9grb8hvqdyc9x vendor-advisory

cve.org (CVE-2024-48944)

nvd.nist.gov (CVE-2024-48944)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-48944

Support options

Helpdesk Chat, Email, Knowledgebase