org.apache.hive:hive-exec@2.3.2 vulnerabilities
-
latest version
4.0.0
-
latest non vulnerable version
-
first published
12 years ago
-
latest version published
a month ago
-
licenses detected
- [0.8.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.apache.hive:hive-exec package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Access Restriction Bypass in the "CREATE" and "DROP" operations due to missing authorization verification. As a result, unauthorized users can manipulate an existing UDF without having the necessary privileges, including dropping and recreating it to point at a malicious jar. How to fix Access Restriction Bypass? Upgrade |
[,3.1.3)
|
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Access Restriction Bypass. Local resources on How to fix Access Restriction Bypass? Upgrade |
[,2.3.4)
[3.1.0,3.1.1)
|
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Authentication Bypass. The How to fix Authentication Bypass? Upgrade |
[,2.3.4)
[3.0.0,3.1.1)
|
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Arbitrary Files Access. A malicious user might use any xpath UDFs to expose the content of a file on the machine running How to fix Arbitrary Files Access? Upgrade |
[0.6.0,2.3.3)
|