Apache Airflow Hive Provider Beeline remote code execution with Principal
Critical severity
GitHub Reviewed
Published
Jul 3, 2023
to the GitHub Advisory Database
•
Updated Nov 10, 2023
Description
Published by the National Vulnerability Database
Jul 3, 2023
Published to the GitHub Advisory Database
Jul 3, 2023
Reviewed
Jul 5, 2023
Last updated
Nov 10, 2023
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider.
This issue affects Apache Airflow Apache Hive Provider: before 6.1.1.
Before version 6.1.1 it was possible to bypass the security check to RCE via
principal parameter. For this to be exploited it requires access to modifying the connection details.
It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.
References