#VU15781 Security restrictions bypass in Apache Hive


Published: 2018-11-08 | Updated: 2018-11-09

Vulnerability identifier: #VU15781

Vulnerability risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1314

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Apache Hive
Server applications / Database software

Vendor: Apache Foundation

Description

The vulnerability allows a remote authenticated attacker to bypass security restrictions on the target system.

The vulnerability exists due to improper security restrictions when the EXPLAIN operation is used. A remote authenticated attacker can use the EXPLAIN operation in a query, bypass security restrictions, access or modify any file and conduct further attacks.

Mitigation
The vulnerability has been fixed in the versions 2.3.4, 3.1.1.

Vulnerable software versions

Apache Hive: 2.3.0 - 3.1.0


External links
http://github.com/pyca/pyopenssl/pull/723


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability