
Cloud Vulnerability DB
A community-led vulnerabilities database
A Server-Side Request Forgery (SSRF) vulnerability was discovered in Apache Kylin, identified as CVE-2024-48944. The vulnerability affects Apache Kylin versions 5.0.0 through 5.0.1. Through a Kylin server, an attacker with admin access could potentially forge requests to invoke '/kylin/api/xxx/diag' API on another internal host, potentially leading to information leakage. The vulnerability was discovered by Zevi and tracked as KYLIN-5644 (Openwall Advisory).
The vulnerability is classified as a Server-Side Request Forgery (SSRF) issue, categorized under CWE-918. The CVSS v3.1 base score is 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. Two specific preconditions must be met for successful exploitation: the attacker must have admin access to a Kylin server, and another internal host must have the '/kylin/api/xxx/diag' API endpoint open for service (NVD Database).
If successfully exploited, the vulnerability could lead to information leakage from internal systems. The impact is primarily focused on confidentiality, with no direct effect on integrity or availability as indicated by the CVSS scoring (NVD Database).
Users are recommended to upgrade to Apache Kylin version 5.0.2, which contains the fix for this vulnerability. This is currently the primary mitigation strategy provided by the vendor (NVD Database).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."