Apache Software Foundation Hive 1.2.0

CPE Details

Apache Software Foundation Hive 1.2.0
1.2.0
2016-03-02
18h39 +00:00
2016-03-02
18h39 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:apache:hive:1.2.0:*:*:*:*:*:*:*

Informations

Vendor

apache

Product

hive

Version

1.2.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-34538 2022-07-16 05h10 +00:00 Apache Hive before 3.1.3 "CREATE" and "DROP" function operations does not check for necessary authorization of involved entities in the query. It was found that an unauthorized user can manipulate an existing UDF without having the privileges to do so. This allowed unauthorized or underprivileged users to drop and recreate UDFs pointing them to new jars that could be potentially malicious.
7.5
Haute
CVE-2020-1926 2021-03-16 13h00 +00:00 Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8
5.9
Moyen
CVE-2020-13949 2021-02-12 18h39 +00:00 In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.
7.5
Haute
CVE-2018-11777 2018-11-08 13h00 +00:00 In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.
8.1
Haute
CVE-2018-1314 2018-11-08 13h00 +00:00 In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics.
4.3
Moyen
CVE-2018-1282 2018-04-05 13h00 +00:00 This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to be used to bypass the argument escaping/cleanup that JDBC driver does in PreparedStatement implementation.
9.1
Critique
CVE-2018-1284 2018-04-05 13h00 +00:00 In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.
3.7
Bas
CVE-2016-3083 2017-05-30 12h00 +00:00 Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC client sends an SSL request to server abc.com, and the server responds with a valid certificate (certified by CA) but issued to xyz.com, the client will accept that as a valid certificate and the SSL handshake will go through.
7.5
Haute
CVE-2015-7521 2016-01-29 19h00 +00:00 The authorization framework in Apache Hive 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0 and 1.2.1, on clusters protected by Ranger and SqlStdHiveAuthorization, allows attackers to bypass intended parent table access restrictions via unspecified partition-level operations.
8.3
Haute