Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6hqr-c69m-r76q

Опубликовано: 05 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 7.2
CVSS3: 8.3

Описание

Apache Hive: Deserialization of untrusted data when fetching partitions from the Metastore

Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data.

In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it performs additional prerechecks on the input arguments.

Пакеты

Наименование

org.apache.hive:hive-exec

maven
Затронутые версииВерсия исправления

= 4.0.0-alpha-1

4.0.0-alpha-2

EPSS

Процентиль: 92%
0.09175
Низкий

7.2 High

CVSS4

8.3 High

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 8.3
redhat
около 1 года назад

Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data. In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it performs additional prerechecks on the input arguments.

CVSS3: 8.3
nvd
около 1 года назад

Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data. In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it performs additional prerechecks on the input arguments.

EPSS

Процентиль: 92%
0.09175
Низкий

7.2 High

CVSS4

8.3 High

CVSS3

Дефекты

CWE-502