Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2021-27738

All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.024
EPSS Ranking 84.5%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2021-27738
  • Apache » Kylin » Version: 3.0.0
    cpe:2.3:a:apache:kylin:3.0.0
  • Apache » Kylin » Version: 3.0.1
    cpe:2.3:a:apache:kylin:3.0.1
  • Apache » Kylin » Version: 3.0.2
    cpe:2.3:a:apache:kylin:3.0.2
  • Apache » Kylin » Version: 3.1.0
    cpe:2.3:a:apache:kylin:3.1.0
  • Apache » Kylin » Version: 3.1.1
    cpe:2.3:a:apache:kylin:3.1.1


Contact Us

Shodan ® - All rights reserved