Arbitrary Code Execution Affecting org.apache.sentry:sentry-binding-hive package, versions [,1.7.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.71% (72nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHESENTRY-449914
  • published14 Jun 2019
  • disclosed13 Nov 2015
  • creditUnknown

Introduced: 13 Nov 2015

CVE-2016-0760  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade org.apache.sentry:sentry-binding-hive to version 1.7.0 or higher.

Overview

org.apache.sentry:sentry-binding-hive is a highly modular system for providing fine grained role based authorization to both data and metadata stored on an Apache Hadoop cluster.

Affected versions of this package are vulnerable to Arbitrary Code Execution. Multiple incomplete blacklist vulnerabilities allow remote authenticated users to execute arbitrary code via the (1) reflect, (2) reflect2, or (3) java_method Hive builtin functions. Exploitation of these methods require authentication.

References

CVSS Base Scores

version 3.1