Executive Summary

Informations
Name CVE-2022-41137 First vendor Publication 2024-12-05
Vendor Cve Last vendor Modification 2024-12-05

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data.

In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it performs additional prerechecks on the input arguments.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41137

Sources (Detail)

http://www.openwall.com/lists/oss-security/2024/12/04/2
https://github.com/apache/hive
https://github.com/apache/hive/commit/60027bb9c91a93affcfebd9068f064bc1f2a74c9
https://issues.apache.org/jira/browse/HIVE-26539
https://lists.apache.org/thread/jwtr3d9yovf2wo0qlxvkhoxnwxxyzgts
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-12-05 21:20:28
  • Multiple Updates
2024-12-05 13:20:31
  • First insertion