=====================================================================

                                 CERT-Renater

                     Note d'Information No. 2024/VULN069
_____________________________________________________________________

DATE                : 30/01/2024

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Kylin versions prior to
                                            4.0.4.

=====================================================================
https://lists.apache.org/thread/o1bvyv9wnfkx7dxpfjlor20nykgsoh6r
_____________________________________________________________________


CVE-2023-29055: Apache Kylin: Insufficiently protected credentials
in config file

Severity: low

Affected versions:

- Apache Kylin 2.0.0 through 4.0.3


Description:

In Apache Kylin version 2.0.0 to 4.0.3, there is a Server Config
web interface that displays the content of file 'kylin.properties',
that may contain serverside credentials. When the kylin service runs
over HTTP (or other plain text protocol), it is possible for network
sniffers to hijack the HTTP payload and get access to the content of
kylin.properties and potentially the containing credentials.

To avoid this threat, users are recommended to
   *  Always turn on HTTPS so that network payload is encrypted.

   *  Avoid putting credentials in kylin.properties, or at least
not in plain text.
   *  Use network firewalls to protect the serverside such that it
is not accessible to external attackers.

   *  Upgrade to version Apache Kylin 4.0.4, which filters out the
sensitive content that goes to the Server Config web interface.


Credit:

Li Jiakun <28...@qq.com> (reporter)


References:

https://kylin.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-29055



=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
