4.0.1
13 years ago
9 months ago
Known vulnerabilities in the org.apache.hive:hive-exec package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource due to the default creation of a credentials file with permissions set to 644 in a temporary directory. An attacker that has access to the temporary directory in the file system can read sensitive information by accessing this directory. How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | [,4.0.1) |
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Access Restriction Bypass in the "CREATE" and "DROP" operations due to missing authorization verification. As a result, unauthorized users can manipulate an existing UDF without having the necessary privileges, including dropping and recreating it to point at a malicious jar. How to fix Access Restriction Bypass? Upgrade | [,3.1.3) |
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Access Restriction Bypass. Local resources on How to fix Access Restriction Bypass? Upgrade | [,2.3.4)[3.1.0,3.1.1) |
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Authentication Bypass. The How to fix Authentication Bypass? Upgrade | [,2.3.4)[3.0.0,3.1.1) |
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Arbitrary Files Access. A malicious user might use any xpath UDFs to expose the content of a file on the machine running How to fix Arbitrary Files Access? Upgrade | [0.6.0,2.3.3) |