{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-35797","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2023-06-17T19:36:58.422Z","datePublished":"2023-07-03T09:08:53.795Z","dateUpdated":"2025-02-13T16:55:55.149Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache Airflow Apache Hive Provider","vendor":"Apache Software Foundation","versions":[{"lessThan":"6.1.1","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"id_No2015429 of 3H Secruity Team"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider.<br><p>This issue affects Apache Airflow Apache Hive Provider: before 6.1.1.<br><br><span style=\"background-color: rgb(255, 255, 255);\">Before version 6.1.1 it was&nbsp;</span><span style=\"background-color: rgb(255, 255, 255);\">possible to bypass the security check to RCE via</span><br><span style=\"background-color: rgb(255, 255, 255);\">principal parameter. For this to be&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">exploited it requires access to modifying the connection details.</span><br></span><br>It is recommended updating provider version to 6.1.1 in order to avoid this&nbsp;vulnerability.</p>"}],"value":"Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider.\nThis issue affects Apache Airflow Apache Hive Provider: before 6.1.1.\n\nBefore version 6.1.1 it was possible to bypass the security check to RCE via\nprincipal parameter. For this to be exploited it requires access to modifying the connection details.\n\nIt is recommended updating provider version to 6.1.1 in order to avoid this vulnerability."}],"metrics":[{"other":{"content":{"text":"moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2023-07-13T22:07:18.438Z"},"references":[{"tags":["patch"],"url":"https://github.com/apache/airflow/pull/31983"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/30y19ok07fw52x5hnkbhwqo3ho0wwc1y"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/12/3"}],"source":{"discovery":"UNKNOWN"},"title":"Apache Airflow Hive Provider Beeline RCE with Principal","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T16:30:45.329Z"},"title":"CVE Program Container","references":[{"tags":["patch","x_transferred"],"url":"https://github.com/apache/airflow/pull/31983"},{"tags":["vendor-advisory","x_transferred"],"url":"https://lists.apache.org/thread/30y19ok07fw52x5hnkbhwqo3ho0wwc1y"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/12/3","tags":["x_transferred"]}]},{"affected":[{"vendor":"apache","product":"apache-airflow-providers-apache-hive","cpes":["cpe:2.3:a:apache:apache-airflow-providers-apache-hive:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"6.1.1","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-10-07T18:27:39.439056Z","id":"CVE-2023-35797","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-07T18:29:34.951Z"}}]}}