CVE-2022-41137

Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data. In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it performs additional prerechecks on the input arguments.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:hive:4.0.0:alpha1:*:*:*:*:*:*

History

15 Jul 2025, 16:34

Type Values Removed Values Added
First Time Apache hive
Apache
CPE cpe:2.3:a:apache:hive:4.0.0:alpha1:*:*:*:*:*:*
References () https://github.com/apache/hive - () https://github.com/apache/hive - Product
References () https://github.com/apache/hive/commit/60027bb9c91a93affcfebd9068f064bc1f2a74c9 - () https://github.com/apache/hive/commit/60027bb9c91a93affcfebd9068f064bc1f2a74c9 - Patch
References () https://issues.apache.org/jira/browse/HIVE-26539 - () https://issues.apache.org/jira/browse/HIVE-26539 - Issue Tracking
References () https://lists.apache.org/thread/jwtr3d9yovf2wo0qlxvkhoxnwxxyzgts - () https://lists.apache.org/thread/jwtr3d9yovf2wo0qlxvkhoxnwxxyzgts - Mailing List, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2024/12/04/2 - () http://www.openwall.com/lists/oss-security/2024/12/04/2 - Mailing List, Third Party Advisory

05 Dec 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-05 10:15

Updated : 2025-07-15 16:34


NVD link : CVE-2022-41137

Mitre link : CVE-2022-41137

CVE.ORG link : CVE-2022-41137


JSON object : View

Products Affected

apache

  • hive
CWE
CWE-502

Deserialization of Untrusted Data