CVE-2023-35797

Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider. This issue affects Apache Airflow Apache Hive Provider: before 6.1.1. Before version 6.1.1 it was possible to bypass the security check to RCE via principal parameter. For this to be exploited it requires access to modifying the connection details. It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:apache-airflow-providers-apache-hive:*:*:*:*:*:*:*:*

History

13 Jul 2023, 23:15

Type Values Removed Values Added
References
  • (MISC) http://www.openwall.com/lists/oss-security/2023/07/12/3 -

11 Jul 2023, 14:56

Type Values Removed Values Added
References (MISC) https://github.com/apache/airflow/pull/31983 - (MISC) https://github.com/apache/airflow/pull/31983 - Patch
References (MISC) https://lists.apache.org/thread/30y19ok07fw52x5hnkbhwqo3ho0wwc1y - (MISC) https://lists.apache.org/thread/30y19ok07fw52x5hnkbhwqo3ho0wwc1y - Mailing List, Vendor Advisory
CPE cpe:2.3:a:apache:apache-airflow-providers-apache-hive:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

03 Jul 2023, 13:02

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-03 10:15

Updated : 2024-10-07 19:36


NVD link : CVE-2023-35797

Mitre link : CVE-2023-35797

CVE.ORG link : CVE-2023-35797


JSON object : View

Products Affected

apache

  • apache-airflow-providers-apache-hive
CWE
CWE-20

Improper Input Validation