Vulnerability Details : CVE-2016-3083
Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC client sends an SSL request to server abc.com, and the server responds with a valid certificate (certified by CA) but issued to xyz.com, the client will accept that as a valid certificate and the SSL handshake will go through.
Products affected by CVE-2016-3083
- cpe:2.3:a:apache:hive:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hive:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hive:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hive:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hive:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hive:0.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hive:0.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hive:0.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:hive:1.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-3083
0.49%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 63 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-3083
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-3083
-
The product does not validate, or incorrectly validates, a certificate.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-3083
-
http://www.securityfocus.com/bid/98669
Apache Hive CVE-2016-3083 Security Bypass Vulnerability
-
https://lists.apache.org/thread.html/0851bcf85635385f94cdaa008053802d92b4aab0a3075e30ed171192@%3Cdev.hive.apache.org%3E
CVE-2016-3083: Apache Hive SSL vulnerability bug disclosure - Pony MailMailing List;Vendor Advisory
Jump to