GHSA-6hqr-c69m-r76q

Suggest an improvement
Source
https://github.com/advisories/GHSA-6hqr-c69m-r76q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-6hqr-c69m-r76q/GHSA-6hqr-c69m-r76q.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-6hqr-c69m-r76q
Aliases
  • CVE-2022-41137
Published
2024-12-05T12:31:28Z
Modified
2024-12-05T20:12:05.471411Z
Severity
  • 8.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H CVSS Calculator
  • 7.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Apache Hive: Deserialization of untrusted data when fetching partitions from the Metastore
Details

Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data.

In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it performs additional prerechecks on the input arguments.

Database specific
{
    "nvd_published_at": "2024-12-05T10:15:04Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-12-05T19:57:26Z"
}
References

Affected packages

Maven / org.apache.hive:hive-exec

Package

Name
org.apache.hive:hive-exec
View open source insights on deps.dev
Purl
pkg:maven/org.apache.hive/hive-exec

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0-alpha-1
Fixed
4.0.0-alpha-2

Affected versions

4.*

4.0.0-alpha-1