Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-24697: Command injection in Apache Software Foundation Apache Kylin

0
Critical
VulnerabilityCVE-2022-24697cvecve-2022-24697
Published: Thu Oct 13 2022 (10/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache Kylin

Description

Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.

AI-Powered Analysis

AILast updated: 07/06/2025, 07:56:14 UTC

Technical Analysis

CVE-2022-24697 is a critical command injection vulnerability found in Apache Kylin, an open-source distributed analytics engine designed for big data. The vulnerability exists in the cube designer function, specifically when users overwrite system parameters via the configuration overwrites menu. The flaw allows an attacker to inject arbitrary operating system commands by manipulating the parameter value of the “--conf=” option. This is achieved by prematurely closing the single quotation marks around the parameter value, enabling command injection into the command line parameters executed by the system. The vulnerability affects multiple versions of Apache Kylin: version 2 up to 2.6.5, version 3 up to 3.1.2, and version 4 up to 4.0.1. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly exploitable remotely. Successful exploitation results in full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected system. The underlying weakness is CWE-78, OS Command Injection, which allows execution of arbitrary commands on the host operating system. No known exploits have been reported in the wild as of the publication date, but the high severity and ease of exploitation make it a significant threat. No official patches or mitigation links were provided in the source information, indicating that organizations must verify the availability of updates from Apache and apply them promptly. Given the nature of Apache Kylin as a big data analytics platform, exploitation could lead to unauthorized data access, data manipulation, or disruption of analytics services.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for enterprises relying on Apache Kylin for big data analytics, business intelligence, and decision-making processes. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain full control over the affected systems. This could result in data breaches involving sensitive or personal data, violating GDPR and other data protection regulations, leading to legal and financial penalties. Additionally, attackers could disrupt critical analytics operations, impacting business continuity and operational efficiency. The compromise could also serve as a foothold for lateral movement within corporate networks, potentially affecting other critical infrastructure. Organizations in sectors such as finance, healthcare, telecommunications, and government, which often leverage big data analytics, are particularly at risk. The lack of required authentication and user interaction further increases the risk of automated exploitation attempts, increasing the likelihood of widespread impact if not mitigated promptly.

Mitigation Recommendations

1. Immediate application of security patches or updates provided by the Apache Software Foundation for Apache Kylin versions 2.6.5 and earlier, 3.1.2 and earlier, and 4.0.1 and earlier is critical. 2. If patches are not yet available, restrict network access to the Apache Kylin cube designer interface to trusted administrators only, using network segmentation and firewall rules. 3. Implement strict input validation and sanitization on configuration parameters to prevent injection of malicious commands. 4. Monitor logs and system behavior for unusual command executions or access patterns indicative of exploitation attempts. 5. Employ application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) capable of detecting command injection patterns targeting Apache Kylin. 6. Conduct regular security audits and penetration testing focused on big data platforms to identify and remediate similar vulnerabilities proactively. 7. Educate system administrators and developers about secure configuration management and the risks of command injection vulnerabilities. 8. Maintain an incident response plan tailored to big data platform compromises to enable rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2022-02-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe9a

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/6/2025, 7:56:14 AM

Last updated: 2/7/2026, 6:36:18 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats