This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Apache Kylin exposes sensitive configuration data via an unauthenticated REST API endpoint.β¦
π‘οΈ **Root Cause**: Missing Access Control. The API `/kylin/api/admin/config` lacks authentication checks. π **Flaw**: Static API endpoint allows public access to admin-level configuration data without any credentials.
Q3Who is affected? (Versions/Components)
π¦ **Affected Products**: Apache Kylin (Open-source distributed OLAP data warehouse). π **Versions**: 2.0.0 through 2.6.6, and 3.0.0-alpha through 4.0.0-alpha. β οΈ **Note**: Many versions are impacted!
β‘ **Threshold**: Extremely Low. π **Auth Required**: None. π **Access**: Publicly accessible via simple HTTP GET request to the specific API path. No login needed.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exploits**: Yes. π **Tools**: Python scripts available on GitHub (e.g., `cve-2020-13937.py`). π **Automation**: Nuclei templates and Pocsui scripts exist for rapid scanning and verification.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Send GET request to `http://<target>/kylin/api/admin/config`. β **Success Indicator**: If you receive a JSON response with config data instead of a 401/403 error, you are vulnerable.β¦
π οΈ **Official Fix**: Yes. Apache released patches for these versions. π₯ **Action**: Upgrade to a patched version immediately. Check the official Apache Kylin release notes for the specific fixed version.
Q9What if no patch? (Workaround)
π§ **No Patch?**: Block external access to the `/kylin/api/admin/config` endpoint via WAF or firewall rules. π **Auth**: Enable authentication for all admin APIs if possible.β¦
π₯ **Urgency**: High. π’ **Priority**: Immediate attention required. Since exploitation is trivial (no auth needed) and PoCs are public, scanners are likely already active. Patch or mitigate ASAP!