Plataforma
java
Componente
org.apache.hive:hive
Corregido en
0.13.1
CVE-2014-0228 is a security vulnerability affecting Apache Hive versions up to 0.13.0. This flaw allows authenticated remote users to potentially access sensitive information through crafted URIs used in import and export operations. The vulnerability arises when Hive operates in SQL standards-based authorization mode, failing to properly validate file permissions. A fix is available in version 0.13.1.
An attacker exploiting CVE-2014-0228 can leverage crafted URIs within import and export statements to bypass file permission checks. This bypass allows them to read files that they should not have access to, potentially exposing sensitive data stored within Hive. The scope of data exposure depends on the permissions of the files accessible through the Hive metastore. While the CVSS score is LOW, the potential for data leakage, especially in environments where Hive stores sensitive data, warrants immediate attention. This vulnerability highlights the importance of proper authorization and access control configurations within Hive deployments.
CVE-2014-0228 was publicly disclosed in 2018. There is no indication of active exploitation campaigns targeting this vulnerability. No public proof-of-concept exploits are readily available. It is not listed on the CISA KEV catalog. The vulnerability's LOW severity and lack of public exploits suggest a relatively low exploitation probability.
Organizations utilizing Apache Hive for data warehousing and processing, particularly those running versions 0.13.0 or earlier, are at risk. This includes environments where Hive is used to store sensitive data, such as personally identifiable information (PII) or financial records. Shared hosting environments where multiple users have access to the Hive metastore are also particularly vulnerable.
• java / server:
ps -ef | grep hive• java / server:
find / -name "hive-site.xml" -print• java / server:
journalctl -u hive -n 100 | grep -i "import" | grep -i "export"discovery
disclosure
Estado del Exploit
EPSS
0.32% (55% percentil)
The primary mitigation for CVE-2014-0228 is to upgrade Apache Hive to version 0.13.1 or later. If upgrading is not immediately feasible, consider disabling SQL standards-based authorization mode as a temporary workaround, although this may impact other functionalities. Review and restrict file permissions within the Hive metastore to limit the potential impact of a successful exploit. Regularly audit Hive configurations and access controls to identify and address potential vulnerabilities. After upgrading, confirm the fix by attempting an import/export operation with a URI that should be denied access.
Sin parche oficial disponible. Busca alternativas o monitorea actualizaciones.
Análisis de vulnerabilidades y alertas críticas directamente en tu correo.
CVE-2014-0228 is a vulnerability in Apache Hive versions up to 0.13.0 that allows authenticated users to access sensitive information via crafted URIs in import/export statements when using SQL standards-based authorization.
You are affected if you are running Apache Hive versions 0.13.0 or earlier and have SQL standards-based authorization enabled.
Upgrade Apache Hive to version 0.13.1 or later. As a temporary workaround, disable SQL standards-based authorization mode.
There is no indication of active exploitation campaigns targeting CVE-2014-0228 at this time.
Refer to the Apache Hive security page for details: https://hive.apache.org/security/
Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.
Sube tu archivo pom.xml y te decimos al instante si estás afectado.