Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-13925

Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.847
EPSS Ranking 99.3%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
Products affected by CVE-2020-13925
  • Apache » Kylin » Version: 2.3.0
    cpe:2.3:a:apache:kylin:2.3.0
  • Apache » Kylin » Version: 2.3.1
    cpe:2.3:a:apache:kylin:2.3.1
  • Apache » Kylin » Version: 2.3.2
    cpe:2.3:a:apache:kylin:2.3.2
  • Apache » Kylin » Version: 2.4.0
    cpe:2.3:a:apache:kylin:2.4.0
  • Apache » Kylin » Version: 2.4.1
    cpe:2.3:a:apache:kylin:2.4.1
  • Apache » Kylin » Version: 2.5.0
    cpe:2.3:a:apache:kylin:2.5.0
  • Apache » Kylin » Version: 2.5.1
    cpe:2.3:a:apache:kylin:2.5.1
  • Apache » Kylin » Version: 2.5.2
    cpe:2.3:a:apache:kylin:2.5.2
  • Apache » Kylin » Version: 2.6.0
    cpe:2.3:a:apache:kylin:2.6.0
  • Apache » Kylin » Version: 2.6.1
    cpe:2.3:a:apache:kylin:2.6.1
  • Apache » Kylin » Version: 2.6.2
    cpe:2.3:a:apache:kylin:2.6.2
  • Apache » Kylin » Version: 2.6.3
    cpe:2.3:a:apache:kylin:2.6.3
  • Apache » Kylin » Version: 2.6.4
    cpe:2.3:a:apache:kylin:2.6.4
  • Apache » Kylin » Version: 2.6.5
    cpe:2.3:a:apache:kylin:2.6.5
  • Apache » Kylin » Version: 2.6.6
    cpe:2.3:a:apache:kylin:2.6.6
  • Apache » Kylin » Version: 3.0.0
    cpe:2.3:a:apache:kylin:3.0.0
  • Apache » Kylin » Version: 3.0.1
    cpe:2.3:a:apache:kylin:3.0.1
  • Apache » Kylin » Version: 3.0.2
    cpe:2.3:a:apache:kylin:3.0.2


Contact Us

Shodan ® - All rights reserved