Skip to main content

CVE-2022-24697: Command injection in Apache Software Foundation Apache Kylin

Critical
VulnerabilityCVE-2022-24697cvecve-2022-24697
Published: Thu Oct 13 2022 (10/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache Kylin

Description

Kylin's cube designer function has a command injection vulnerability when overwriting system parameters in the configuration overwrites menu. RCE can be implemented by closing the single quotation marks around the parameter value of “-- conf=” to inject any operating system command into the command line parameters. This vulnerability affects Kylin 2 version 2.6.5 and earlier, Kylin 3 version 3.1.2 and earlier, and Kylin 4 version 4.0.1 and earlier.

AI-Powered Analysis

AILast updated: 07/06/2025, 07:56:14 UTC

Technical Analysis

CVE-2022-24697 is a critical command injection vulnerability found in Apache Kylin, an open-source distributed analytics engine designed for big data. The vulnerability exists in the cube designer function, specifically when users overwrite system parameters via the configuration overwrites menu. The flaw allows an attacker to inject arbitrary operating system commands by manipulating the parameter value of the “--conf=” option. This is achieved by prematurely closing the single quotation marks around the parameter value, enabling command injection into the command line parameters executed by the system. The vulnerability affects multiple versions of Apache Kylin: version 2 up to 2.6.5, version 3 up to 3.1.2, and version 4 up to 4.0.1. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly exploitable remotely. Successful exploitation results in full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H) of the affected system. The underlying weakness is CWE-78, OS Command Injection, which allows execution of arbitrary commands on the host operating system. No known exploits have been reported in the wild as of the publication date, but the high severity and ease of exploitation make it a significant threat. No official patches or mitigation links were provided in the source information, indicating that organizations must verify the availability of updates from Apache and apply them promptly. Given the nature of Apache Kylin as a big data analytics platform, exploitation could lead to unauthorized data access, data manipulation, or disruption of analytics services.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for enterprises relying on Apache Kylin for big data analytics, business intelligence, and decision-making processes. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain full control over the affected systems. This could result in data breaches involving sensitive or personal data, violating GDPR and other data protection regulations, leading to legal and financial penalties. Additionally, attackers could disrupt critical analytics operations, impacting business continuity and operational efficiency. The compromise could also serve as a foothold for lateral movement within corporate networks, potentially affecting other critical infrastructure. Organizations in sectors such as finance, healthcare, telecommunications, and government, which often leverage big data analytics, are particularly at risk. The lack of required authentication and user interaction further increases the risk of automated exploitation attempts, increasing the likelihood of widespread impact if not mitigated promptly.

Mitigation Recommendations

1. Immediate application of security patches or updates provided by the Apache Software Foundation for Apache Kylin versions 2.6.5 and earlier, 3.1.2 and earlier, and 4.0.1 and earlier is critical. 2. If patches are not yet available, restrict network access to the Apache Kylin cube designer interface to trusted administrators only, using network segmentation and firewall rules. 3. Implement strict input validation and sanitization on configuration parameters to prevent injection of malicious commands. 4. Monitor logs and system behavior for unusual command executions or access patterns indicative of exploitation attempts. 5. Employ application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) capable of detecting command injection patterns targeting Apache Kylin. 6. Conduct regular security audits and penetration testing focused on big data platforms to identify and remediate similar vulnerabilities proactively. 7. Educate system administrators and developers about secure configuration management and the risks of command injection vulnerabilities. 8. Maintain an incident response plan tailored to big data platform compromises to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2022-02-09T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe9a

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/6/2025, 7:56:14 AM

Last updated: 7/30/2025, 2:54:10 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats