Apache Software Foundation Apache Hive vulnerabilities

15 known vulnerabilities affecting apache_software_foundation/apache_hive.

Total CVEs
15
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH4MEDIUM8LOW2

Vulnerabilities

Page 1 of 1
CVE-2025-62728MEDIUMCVSS 5.4≥ 4.1.0, < 4.2.02025-11-26
CVE-2025-62728 [MEDIUM] CWE-89 CVE-2025-62728: SQL injection vulnerability in Hive Metastore Server (HMS) when processing delete column statistics SQL injection vulnerability in Hive Metastore Server (HMS) when processing delete column statistics requests via the Thrift APIs. The vulnerability is only exploitable by trusted/authorized users/applications that are allowed to call directly the Thrift APIs. In most real-world deployments, HMS is accessible to only a handful of applications (e.g., Hi
cvelistv5nvd
CVE-2024-29869MEDIUMCVSS 5.5≥ 1.1.0, < 4.0.12025-01-28
CVE-2024-29869 [MEDIUM] CWE-732 CVE-2024-29869: Hive creates a credentials file to a temporary directory in the file system with permissions 644 by Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unauthorized user having access to the directory can read the sensitive information written into this file. Users are recommended to upgrade to version 4.0.1, which fixes this issue.
cvelistv5nvd
CVE-2024-23953MEDIUMCVSS 6.5≥ 2.2.0, < 4.0.02025-01-28
CVE-2024-23953 [MEDIUM] CWE-208 CVE-2024-23953: Use of Arrays.equals() in LlapSignerImpl in Apache Hive to compare message signatures allows attacke Use of Arrays.equals() in LlapSignerImpl in Apache Hive to compare message signatures allows attacker to forge a valid signature for an arbitrary message byte by byte. The attacker should be an authorized user of the product to perform this attack. Users are recommended to upgrade to version 4.0.0, which fixes this issue. The problem occurs when an
cvelistv5nvd
CVE-2024-23945MEDIUMCVSS 5.9≥ 1.2.0, < 4.0.02024-12-23
CVE-2024-23945 [MEDIUM] CWE-209 CVE-2024-23945: Signing cookies is an application security feature that adds a digital signature to cookie data to v Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to
cvelistv5nvd
CVE-2022-41137HIGHCVSS 8.3≥ 4.0.0-alpha-1, < 4.0.02024-12-05
CVE-2022-41137 [HIGH] CWE-502 CVE-2022-41137: Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data. In real deployments, the vulnerability can be exploited only by authenticated users/clients that wer
cvelistv5nvd
CVE-2023-35701MEDIUMCVSS 6.6≥ 4.0.0-alpha-1, < 4.0.02024-05-03
CVE-2023-35701 [MEDIUM] CWE-94 CVE-2023-35701: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Hive. The vulnera Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Hive. The vulnerability affects the Hive JDBC driver component and it can potentially lead to arbitrary code execution on the machine/endpoint that the JDBC driver (client) is running. The malicious user must have sufficient permissions to specify/edit JDBC URL(s) in a
cvelistv5nvd
CVE-2021-34538HIGHCVSS 7.5≥ Apache Hive, < 3.1.32022-07-16
CVE-2021-34538 [HIGH] CWE-306 CVE-2021-34538: Apache Hive before 3.1.3 "CREATE" and "DROP" function operations does not check for necessary author Apache Hive before 3.1.3 "CREATE" and "DROP" function operations does not check for necessary authorization of involved entities in the query. It was found that an unauthorized user can manipulate an existing UDF without having the privileges to do so. This allowed unauthorized or underprivileged users to drop and recreate UDFs pointing them to new ja
cvelistv5nvd
CVE-2020-1926MEDIUMCVSS 5.9≥ Apache Hive, < 2.3.82021-03-16
CVE-2020-1926 [MEDIUM] CWE-208 CVE-2020-1926: Apache Hive cookie signature verification used a non constant time comparison which is known to be v Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8
cvelistv5nvd
CVE-2018-11777HIGHCVSS 8.1vAll versions of Hive, including 2.3.3, 3.1.0 and earlier2018-11-08
CVE-2018-11777 [HIGH] CVE-2018-11777: In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly pr In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.
cvelistv5nvd
CVE-2018-1314MEDIUMCVSS 4.3vAll versions of Hive including 2.3.3, 3.1.0 and earlier2018-11-08
CVE-2018-1314 [MEDIUM] CWE-862 CVE-2018-1314: In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary autho In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics.
cvelistv5nvd
CVE-2018-1282CRITICALCVSS 9.1v0.7.1 to 2.3.22018-04-05
CVE-2018-1282 [CRITICAL] CWE-89 CVE-2018-1282: This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to b This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to be used to bypass the argument escaping/cleanup that JDBC driver does in PreparedStatement implementation.
cvelistv5nvd
CVE-2018-1284LOWCVSS 3.7v0.6.0 to 2.3.22018-04-05
CVE-2018-1284 [LOW] CWE-200 CVE-2018-1284: In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boo In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.
cvelistv5nvd
CVE-2018-1315LOWCVSS 3.7v2.1.0 to 2.3.22018-04-05
CVE-2018-1315 [LOW] CWE-732 CVE-2018-1315: In Apache Hive 2.1.0 to 2.3.2, when 'COPY FROM FTP' statement is run using HPL/SQL extension to Hive In Apache Hive 2.1.0 to 2.3.2, when 'COPY FROM FTP' statement is run using HPL/SQL extension to Hive, a compromised/malicious FTP server can cause the file to be written to an arbitrary location on the cluster where the command is run from. This is because FTP client code in HPL/SQL does not verify the destination location of the downloaded file. This do
cvelistv5nvd
CVE-2017-12625MEDIUMCVSS 4.3v2.1.x before 2.1.2v2.2.x before 2.2.1+1 more2017-11-01
CVE-2017-12625 [MEDIUM] CWE-200 CVE-2017-12625: Apache Hive 2.1.x before 2.1.2, 2.2.x before 2.2.1, and 2.3.x before 2.3.1 expose an interface throu Apache Hive 2.1.x before 2.1.2, 2.2.x before 2.2.1, and 2.3.x before 2.3.1 expose an interface through which masking policies can be defined on tables or views, e.g., using Apache Ranger. When a view is created over a given table, the policy enforcement does not happen correctly on the table for masked columns.
cvelistv5nvd
CVE-2016-3083HIGHCVSS 7.5v0.11.0 - 0.14.0v1.0.0 - 1.2.1+1 more2017-05-30
CVE-2016-3083 [HIGH] CWE-295 CVE-2016-3083: Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC clien
cvelistv5nvd