cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-29869,https://securityvulnerability.io/vulnerability/CVE-2024-29869,Unauthorized File Access Vulnerability in Apache Hive,"Apache Hive is susceptible to an improper file permissions vulnerability where it creates a credentials file in a temporary directory with default permissions set to 644. This oversight allows any unauthorized user with access to the directory to read sensitive information contained within the file. It is critical for users to upgrade to version 4.0.1 or later, which addresses this vulnerability and helps mitigate the risk of unauthorized information disclosure.",Apache,Apache Hive,5.5,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-01-28T21:31:43.422Z,0 CVE-2024-23953,https://securityvulnerability.io/vulnerability/CVE-2024-23953,Timing Attack in Apache Hive Allows Signature Forgery by Authorized Users,"A vulnerability in Apache Hive's LlapSignerImpl allows an attacker, who is already an authorized user, to forge valid signatures for arbitrary messages by exploiting the non-constant time behavior of the Arrays.equals() method. This flaw permits attackers to manipulate message validation, potentially leading to malicious submissions to LLAP. The associated issue could enable unauthorized activities, such as Denial of Service (DDoS) attacks, as it relies on the differences in signature comparison times. Users are strongly advised to upgrade to version 4.0.0 or later to mitigate this risk.",Apache,Apache Hive,6.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,false,false,false,,2025-01-28T09:07:22.333Z,0 CVE-2024-23945,https://securityvulnerability.io/vulnerability/CVE-2024-23945,Application Security Flaw in Apache Hive and Spark Affecting Cookie Signature Verification,"An application security flaw exists in Apache Hive and Apache Spark concerning the improper handling of signed cookies. This vulnerability allows an incorrect signature mismatch to expose the signed cookie to users, potentially enabling malicious actors to alter the cookie's value. The vulnerability traces back to the CookieSigner logic introduced in Apache Hive via HIVE-9710 starting from version 1.2.0 and in Apache Spark through SPARK-14987 from version 2.0.0. The exposure of these cookies can result in unauthorized access and further exploitation of the application, raising significant security concerns for users relying on these platforms.",Apache,"Apache Hive,Apache Spark",,,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-12-23T15:26:54.477Z,278 CVE-2022-41137,https://securityvulnerability.io/vulnerability/CVE-2022-41137,Unsecure Method in Apache Hive Metastore Leads to Remote Code Execution Vulnerability,"The Apache Hive Metastore is affected by a vulnerability that stems from its use of the unsafe method SerializationUtilities#deserializeObjectWithTypeInformation when filtering and fetching partitions. This flaw permits the deserialization of arbitrary data, which can potentially lead to Remote Code Execution (RCE). Exploitation of this vulnerability requires that the attacker is an authenticated user or client who has established a connection to the Metastore. Moreover, any code that interacts with this unsafe method may be susceptible unless it incorporates stringent prechecks on input parameters.",Apache,Apache Hive,,,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-12-05T10:01:41.692Z,0 CVE-2023-35701,https://securityvulnerability.io/vulnerability/CVE-2023-35701,Apache Hive Vulnerable to Code Injection Attacks,"An issue within the Apache Hive JDBC driver introduces a vulnerability that can lead to arbitrary code execution on the host machine running the driver. This vulnerability occurs when a malicious user, having the necessary permissions, crafts a malicious JDBC URL that points to a compromised HTTP server. Upon attempting to establish a JDBC connection, the server responds with a specially crafted payload capable of executing arbitrary commands within the client process, particularly if it operates with elevated privileges. The vulnerability affects versions prior to 4.0.0 of Apache Hive. Immediate upgrade to the patched version is strongly advised to mitigate potential threats.",Apache,Apache Hive,,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-05-03T08:11:08.215Z,0 CVE-2023-37415,https://securityvulnerability.io/vulnerability/CVE-2023-37415,Apache Airflow Apache Hive Provider: Improper Input Validation in Hive Provider with proxy_user,"An improper input validation vulnerability exists in the Apache Airflow Apache Hive Provider prior to version 6.1.2, allowing user-controlled input to potentially inject unintended commands. Specifically, the proxy_user option is susceptible to injection of a semicolon, which can lead to further exploitation. It is critical for users to update to version 6.1.2 or later to mitigate this risk and maintain secure operations.",Apache,Apache Airflow Apache Hive Provider,8.8,HIGH,0.0012600000482052565,false,,false,false,false,,,false,false,,2023-07-13T08:15:00.000Z,0 CVE-2023-35797,https://securityvulnerability.io/vulnerability/CVE-2023-35797,Apache Airflow Hive Provider Beeline RCE with Principal,"The Apache Airflow Hive Provider prior to version 6.1.1 contains an improper input validation vulnerability that allows an attacker to bypass security checks and potentially execute remote code through the manipulation of the principal parameter. This exploit requires access to modify connection details, highlighting the importance of securing these configurations. To mitigate this risk, it is crucial to update to version 6.1.1 or later.",Apache,Apache Airflow Apache Hive Provider,9.8,CRITICAL,0.0032999999821186066,false,,false,false,false,,,false,false,,2023-07-03T10:15:00.000Z,0 CVE-2021-40331,https://securityvulnerability.io/vulnerability/CVE-2021-40331,Permissions problem in the Apache Ranger Hive Plugin,"An Incorrect Permission Assignment for Critical Resource vulnerability exists in the Apache Ranger Hive Plugin, allowing any user with SELECT privilege on a database to modify the ownership of a table in Hive. This vulnerability impacts versions 2.0.0 to 2.3.0 and poses significant risks to data integrity. Users are strongly advised to upgrade to version 2.4.0 or higher to mitigate these security risks.",Apache,Apache Ranger Hive Plugin,8.1,HIGH,0.0006699999794363976,false,,false,false,false,,,false,false,,2023-05-05T07:55:06.554Z,0 CVE-2023-28706,https://securityvulnerability.io/vulnerability/CVE-2023-28706,Apache Airflow Hive Provider Beeline Remote Command Execution,"A vulnerability exists in the Apache Airflow Hive Provider, where improper control during code generation could lead to code injection attacks. This can enable unauthorized actions and manipulation of input data by malicious actors, potentially compromising the integrity of the application. Users are advised to upgrade to version 6.0.0 or later to mitigate this risk.",Apache,Apache Airflow Hive Provider,9.8,CRITICAL,0.01616000011563301,false,,false,false,false,,,false,false,,2023-04-07T15:15:00.000Z,0 CVE-2023-25696,https://securityvulnerability.io/vulnerability/CVE-2023-25696,Apache Airflow Hive Provider Beeline RCE,"The Apache Airflow Hive Provider contains a vulnerability due to improper input validation, potentially allowing an attacker to exploit the system. This issue specifically affects versions prior to 5.1.3. Users are advised to upgrade to the latest version to mitigate this risk and enhance the overall security posture of their applications.",Apache,Apache Airflow Hive Provider,9.8,CRITICAL,0.0026000000070780516,false,,false,false,false,,,false,false,,2023-02-24T12:15:00.000Z,0 CVE-2022-46421,https://securityvulnerability.io/vulnerability/CVE-2022-46421,Apache Airflow Hive Provider: Hive Provider RCE vulnerability with hive_cli_params,"Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache Airflow Hive Provider.This issue affects Apache Airflow Hive Provider: before 5.0.0. ",Apache,Apache Airflow Hive Provider,9.8,CRITICAL,0.009879999794065952,false,,false,false,false,,,false,false,,2022-12-20T10:20:39.431Z,0 CVE-2022-41131,https://securityvulnerability.io/vulnerability/CVE-2022-41131,Apache Airflow Hive Provider vulnerability (command injection via hive_cli connection),"Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Hive Provider, Apache Airflow allows an attacker to execute arbtrary commands in the task execution context, without write access to DAG files. This issue affects Hive Provider versions prior to 4.1.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case HIve Provider is installed (Hive Provider 4.1.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the HIve Provider version 4.1.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version that has lower version of the Hive Provider installed).",Apache,"Apache Airflow Hive Provider,Apache Airflow",7.8,HIGH,0.001180000021122396,false,,false,false,false,,,false,false,,2022-11-22T00:00:00.000Z,0 CVE-2021-34538,https://securityvulnerability.io/vulnerability/CVE-2021-34538,Apache Hive Security vulnerability in Hive with UDFs,"Apache Hive before 3.1.3 ""CREATE"" and ""DROP"" function operations does not check for necessary authorization of involved entities in the query. It was found that an unauthorized user can manipulate an existing UDF without having the privileges to do so. This allowed unauthorized or underprivileged users to drop and recreate UDFs pointing them to new jars that could be potentially malicious.",Apache,Apache Hive,7.5,HIGH,0.003169999923557043,false,,false,false,false,,,false,false,,2022-07-16T07:10:09.000Z,0 CVE-2020-1926,https://securityvulnerability.io/vulnerability/CVE-2020-1926,Timing attack in Cookie signature verification,Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8,Apache,Apache Hive,5.9,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2021-03-16T13:00:16.000Z,0 CVE-2018-11777,https://securityvulnerability.io/vulnerability/CVE-2018-11777,,"In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.",Apache,Apache Hive,8.1,HIGH,0.0008299999753944576,false,,false,false,false,,,false,false,,2018-11-08T14:00:00.000Z,0 CVE-2018-1314,https://securityvulnerability.io/vulnerability/CVE-2018-1314,,"In Apache Hive 2.3.3, 3.1.0 and earlier, Hive ""EXPLAIN"" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do ""EXPLAIN"" on arbitrary table or view and expose table metadata and statistics.",Apache,Apache Hive,4.3,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2018-11-08T14:00:00.000Z,0 CVE-2018-1315,https://securityvulnerability.io/vulnerability/CVE-2018-1315,,"In Apache Hive 2.1.0 to 2.3.2, when 'COPY FROM FTP' statement is run using HPL/SQL extension to Hive, a compromised/malicious FTP server can cause the file to be written to an arbitrary location on the cluster where the command is run from. This is because FTP client code in HPL/SQL does not verify the destination location of the downloaded file. This does not affect hive cli user and hiveserver2 user as hplsql is a separate command line script and needs to be invoked differently.",Apache,Apache Hive,3.7,LOW,0.0017500000540167093,false,,false,false,false,,,false,false,,2018-04-05T13:29:00.000Z,0 CVE-2018-1284,https://securityvulnerability.io/vulnerability/CVE-2018-1284,,"In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.",Apache,Apache Hive,3.7,LOW,0.0005000000237487257,false,,false,false,false,,,false,false,,2018-04-05T13:29:00.000Z,0 CVE-2018-1282,https://securityvulnerability.io/vulnerability/CVE-2018-1282,,This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to be used to bypass the argument escaping/cleanup that JDBC driver does in PreparedStatement implementation.,Apache,Apache Hive,9.1,CRITICAL,0.0010600000387057662,false,,false,false,false,,,false,false,,2018-04-05T13:29:00.000Z,0 CVE-2017-12625,https://securityvulnerability.io/vulnerability/CVE-2017-12625,,"Apache Hive 2.1.x before 2.1.2, 2.2.x before 2.2.1, and 2.3.x before 2.3.1 expose an interface through which masking policies can be defined on tables or views, e.g., using Apache Ranger. When a view is created over a given table, the policy enforcement does not happen correctly on the table for masked columns.",Apache,Apache Hive,4.3,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2017-11-01T13:29:00.000Z,0 CVE-2016-3083,https://securityvulnerability.io/vulnerability/CVE-2016-3083,,"Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC client sends an SSL request to server abc.com, and the server responds with a valid certificate (certified by CA) but issued to xyz.com, the client will accept that as a valid certificate and the SSL handshake will go through.",Apache,Apache Hive,7.5,HIGH,0.0011899999808520079,false,,false,false,false,,,false,false,,2017-05-30T14:00:00.000Z,0