4.0.1
13 years ago
2 months ago
Known vulnerabilities in the org.apache.hive:hive-exec package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Access Restriction Bypass in the "CREATE" and "DROP" operations due to missing authorization verification. As a result, unauthorized users can manipulate an existing UDF without having the necessary privileges, including dropping and recreating it to point at a malicious jar. How to fix Access Restriction Bypass? Upgrade | [,3.1.3) |
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Authentication Bypass. The How to fix Authentication Bypass? Upgrade | [,2.3.4)[3.0.0,3.1.1) |
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Access Restriction Bypass. Local resources on How to fix Access Restriction Bypass? Upgrade | [,2.3.4)[3.1.0,3.1.1) |
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Arbitrary Files Access. A malicious user might use any xpath UDFs to expose the content of a file on the machine running How to fix Arbitrary Files Access? Upgrade | [0.6.0,2.3.3) |
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Improper Access Control. When in SQL standards based authorization mode, the package does not properly check the file permissions for (1) import and (2) export statements, which allows remote authenticated users to obtain sensitive information via a crafted URI. How to fix Improper Access Control? Upgrade | [0.8.0,0.13.1) |