In the fix for CVE-2022-24697, a blacklist is used to filter user input commands. But there is a risk of being bypassed. The user can control the command by controlling the kylin.engine.spark-cmd parameter of conf.
Workaround:
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete.
Link | Tags |
---|---|
https://lists.apache.org/thread/ob2ks04zl5ms0r44cd74y1xdl1rzfd1r | mailing list patch vendor advisory |