![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-29869 – Apache Hive: Credentials file created with non restrictive permissions
https://notcve.org/view.php?id=CVE-2024-29869
28 Jan 2025 — Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unauthorized user having access to the directory can read the sensitive information written into this file. Users are recommended to upgrade to version 4.0.1, which fixes this issue. Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unaut... • https://github.com/apache/hive • CWE-732: Incorrect Permission Assignment for Critical Resource •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-23953 – Apache Hive: Timing Attack Against Signature in LLAP util
https://notcve.org/view.php?id=CVE-2024-23953
28 Jan 2025 — Use of Arrays.equals() in LlapSignerImpl in Apache Hive to compare message signatures allows attacker to forge a valid signature for an arbitrary message byte by byte. The attacker should be an authorized user of the product to perform this attack. Users are recommended to upgrade to version 4.0.0, which fixes this issue. The problem occurs when an application doesn’t use a constant-time algorithm for validating a signature. The method Arrays.equals() returns false right away when it sees that one of the in... • https://blog.gypsyengineer.com/en/security/preventing-timing-attacks-with-codeql.html • CWE-208: Observable Timing Discrepancy CWE-290: Authentication Bypass by Spoofing •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-23945 – Apache Hive, Apache Spark, Apache Spark: CookieSigner exposes the correct signature when message verification fails
https://notcve.org/view.php?id=CVE-2024-23945
23 Dec 2024 — Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitatio... • https://github.com/apache/hive • CWE-209: Generation of Error Message Containing Sensitive Information •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-41137 – Apache Hive: Deserialization of untrusted data when fetching partitions from the Metastore
https://notcve.org/view.php?id=CVE-2022-41137
05 Dec 2024 — Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data. In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it perfo... • https://github.com/apache/hive • CWE-502: Deserialization of Untrusted Data •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-35701 – Apache Hive: Arbitrary command execution via JDBC driver
https://notcve.org/view.php?id=CVE-2023-35701
03 May 2024 — Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Hive. The vulnerability affects the Hive JDBC driver component and it can potentially lead to arbitrary code execution on the machine/endpoint that the JDBC driver (client) is running. The malicious user must have sufficient permissions to specify/edit JDBC URL(s) in an endpoint relying on the Hive JDBC driver and the JDBC client process must run under a privileged user to fully exploit the vulnerability. The attacker can setu... • http://www.openwall.com/lists/oss-security/2024/05/03/3 • CWE-94: Improper Control of Generation of Code ('Code Injection') •