VYPR
High severityNVD Advisory· Published Jan 6, 2022· Updated Aug 4, 2024

Overly broad CORS configuration

CVE-2021-45457

Description

In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Kylin's CORS configuration allows cross-origin requests with credentials from any origin, enabling potential credential theft or unauthorized API access.

Vulnerability

Apache Kylin versions 2.6.6 and prior, 3.1.2 and prior, and 4.0.0 and prior contain an overly broad Cross-Origin Resource Sharing (CORS) configuration. The server reflects the Origin header in the Access-Control-Allow-Origin response and sets Access-Control-Allow-Credentials to true, allowing cross-origin requests with credentials from any origin [1][3]. No special configuration is required to reach the vulnerable code path, as this is the default CORS policy.

Exploitation

An attacker hosting a malicious website can craft a preflight OPTIONS request to a Kylin endpoint, which will be responded to with the reflected origin and credentials allowed. Subsequent authenticated requests from the attacker’s site can include Kylin session cookies or other credentials, enabling cross-origin data access. The attacker needs no prior authentication to Kylin; they only need to lure a logged-in Kylin user to visit the malicious site [3].

Impact

Successful exploitation allows the attacker to perform actions on the Kylin API as the victim user, potentially leading to unauthorized information disclosure, data modification, or other operations depending on the victim’s privileges. Since credentials are forwarded, any API endpoint that the victim can access may be invoked cross-origin.

Mitigation

A fix has been proposed in pull request #1781 on GitHub to restrict the CORS configuration [4]. As of the publication date (2022-01-06), a patched version has not been released. Administrators should restrict the Access-Control-Allow-Origin header to trusted origins, for example by configuring a whitelist in the Kylin server settings. This CVE is not listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.kylin:kylinMaven
< 3.1.33.1.3
org.apache.kylin:kylinMaven
>= 4.0.0, < 4.0.14.0.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.