Vulnerability Details : CVE-2023-35797
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider.
This issue affects Apache Airflow Apache Hive Provider: before 6.1.1.
Before version 6.1.1 it was possible to bypass the security check to RCE via
principal parameter. For this to be exploited it requires access to modifying the connection details.
It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.
Products affected by CVE-2023-35797
- cpe:2.3:a:apache:apache-airflow-providers-apache-hive:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-35797
2.83%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-35797
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-10-07 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-35797
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security@apache.org (Secondary)
References for CVE-2023-35797
-
https://github.com/apache/airflow/pull/31983
Sanitize beeline principal parameter by potiuk · Pull Request #31983 · apache/airflow · GitHubPatch
-
http://www.openwall.com/lists/oss-security/2023/07/12/3
oss-security - CVE-2023-37415: Apache Airflow Apache Hive Provider: Improper Input Validation in Hive Provider with proxy_user
-
https://lists.apache.org/thread/30y19ok07fw52x5hnkbhwqo3ho0wwc1y
CVE-2023-35797: Apache Airflow Hive Provider Beeline RCE with Principal-Apache Mail ArchivesMailing List;Vendor Advisory
Jump to