CVE-2024-48944
Severity CVSS v4.0:
Pending analysis
Type:
CWE-918
Server-Side Request Forgery (SSRF)
Publication date:
27/03/2025
Last modified:
01/04/2025
Description
Server-Side Request Forgery (SSRF) vulnerability in Apache Kylin. Through a kylin server, an attacker may forge a request to invoke "/kylin/api/xxx/diag" api on another internal host and possibly get leaked information. There are two preconditions: 1) The attacker has got admin access to a kylin server; 2) Another internal host has the "/kylin/api/xxx/diag" api<br />
<br />
endpoint open for service.<br />
<br />
<br />
This issue affects Apache Kylin: from 5.0.0 <br />
through <br />
<br />
5.0.1.<br />
<br />
Users are recommended to upgrade to version 5.0.2, which fixes the issue.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:kylin:*:*:*:*:*:*:*:* | 5.0.0 (including) | 5.0.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



