First published: Mon Jul 03 2023(Updated: )
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider. This issue affects Apache Airflow Apache Hive Provider: before 6.1.1. Before version 6.1.1 it was possible to bypass the security check to RCE via principal parameter. For this to be exploited it requires access to modifying the connection details. It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Apache-airflow-providers-apache-hive | <6.1.1 | |
pip/apache-airflow-providers-apache-hive | <6.1.1 | 6.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35797 is an Improper Input Validation vulnerability found in Apache Airflow Hive Provider before version 6.1.1.
CVE-2023-35797 allows bypassing the security check to achieve Remote Code Execution (RCE) via the principal parameter.
The severity of CVE-2023-35797 is critical with a CVSS score of 9.8.
CVE-2023-35797 can be exploited by bypassing the security check and injecting malicious code through the principal parameter.
To fix CVE-2023-35797, upgrade your Apache Airflow Hive Provider to version 6.1.1 or later.