Apache Kylin Server-Side Request Forgery (SSRF) via `/kylin/api/xxx/diag` Endpoint
Low severity
GitHub Reviewed
Published
Mar 27, 2025
to the GitHub Advisory Database
•
Updated Mar 27, 2025
Package
Affected versions
>= 5.0.0, < 5.0.2
Patched versions
5.0.2
Description
Published by the National Vulnerability Database
Mar 27, 2025
Published to the GitHub Advisory Database
Mar 27, 2025
Reviewed
Mar 27, 2025
Last updated
Mar 27, 2025
Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. Through a kylin server, an attacker may forge a request to invoke "/kylin/api/xxx/diag" api on another internal host and possibly get leaked information. There are two preconditions: 1) The attacker has got admin access to a kylin server; 2) Another internal host has the "/kylin/api/xxx/diag" api endpoint open for service.
This issue affects Apache Kylin: from 5.0.0 through 5.0.1.
Users are recommended to upgrade to version 5.0.2, which fixes the issue.
References