Lucene search

K
cvelistApacheCVELIST:CVE-2023-35797
HistoryJul 03, 2023 - 9:08 a.m.

CVE-2023-35797 Apache Airflow Hive Provider Beeline RCE with Principal

2023-07-0309:08:53
CWE-20
apache
www.cve.org
2
apache airflow hive provider
remote code execution
input validation

AI Score

9.4

Confidence

High

EPSS

0.003

Percentile

70.5%

Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider.
This issue affects Apache Airflow Apache Hive Provider: before 6.1.1.

Before version 6.1.1 it was possible to bypass the security check to RCE via
principal parameter. For this to be exploited it requires access to modifying the connection details.

It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Airflow Apache Hive Provider",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "6.1.1",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

AI Score

9.4

Confidence

High

EPSS

0.003

Percentile

70.5%

Related for CVELIST:CVE-2023-35797