CVE-2023-35797Improper Input Validation in Software Foundation Apache Airflow Apache Hive Provider

Severity
9.8CRITICALNVD
EPSS
0.5%
top 33.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 3
Latest updateJul 13

Description

Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider. This issue affects Apache Airflow Apache Hive Provider: before 6.1.1. Before version 6.1.1 it was possible to bypass the security check to RCE via principal parameter. For this to be exploited it requires access to modifying the connection details. It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Patches

🔴Vulnerability Details

4
GHSA
Apache Airflow Apache Hive Provider Improper Input Validation vulnerability2023-07-13
CVEList
Apache Airflow Hive Provider Beeline RCE with Principal2023-07-03
OSV
Apache Airflow Hive Provider Beeline remote code execution with Principal2023-07-03
GHSA
Apache Airflow Hive Provider Beeline remote code execution with Principal2023-07-03
CVE-2023-35797 — Improper Input Validation | cvebase