First published: Fri Mar 15 2024(Updated: )
The Snowflake Hive metastore connector provides an easy way to query Hive-managed data via Snowflake. Snowflake Hive MetaStore Connector has addressed a potential elevation of privilege vulnerability in a `helper script` for the Hive MetaStore Connector. A malicious insider without admin privileges could, in theory, use the script to download content from a Microsoft domain to the local system and replace the valid content with malicious code. If the attacker then also had local access to the same system where the maliciously modified script is run, they could attempt to manipulate users into executing the attacker-controlled helper script, potentially gaining elevated privileges to the local system. The vulnerability in the script was patched on February 09, 2024, without a version bump to the Connector. User who use the helper script are strongly advised to use the latest version as soon as possible. Users unable to upgrade should avoid using the helper script.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Snowflake |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-28851 is considered moderate due to its potential for elevation of privilege.
To fix CVE-2024-28851, it is essential to update the Snowflake Hive Metastore Connector to the latest version provided by Snowflake.
CVE-2024-28851 could allow a malicious insider to gain elevated privileges which could compromise data integrity and security.
CVE-2024-28851 is not considered a remote vulnerability, as it requires an insider to exploit it.
CVE-2024-28851 affects all currently supported versions of the Snowflake Hive Metastore Connector prior to the release of the patch.