Apache Hive: Deserialization of untrusted data when fetching partitions from the Metastore
High severity
GitHub Reviewed
Published
Dec 5, 2024
to the GitHub Advisory Database
•
Updated Dec 5, 2024
Package
Affected versions
= 4.0.0-alpha-1
Patched versions
4.0.0-alpha-2
Description
Published by the National Vulnerability Database
Dec 5, 2024
Published to the GitHub Advisory Database
Dec 5, 2024
Reviewed
Dec 5, 2024
Last updated
Dec 5, 2024
Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data.
In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it performs additional prerechecks on the input arguments.
References