logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2020-1956

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2020-1956

Description:
Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
Last updated date:
03/06/2025

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
03/25/2022
Reference url to background

https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Type:
exploit
Confidence:
HIGH
Date of publishing:
07/09/2021
Reference url to background

https://github.com/b510/CVE-2020-1956

Type:
exploit
Confidence:
HIGH
Date of publishing:
07/16/2024
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy