CVE-2022-41137

Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data. In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it performs additional prerechecks on the input arguments.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:hive:4.0.0:alpha1:*:*:*:*:*:*

History

15 Jul 2025, 16:34

Type Values Removed Values Added
First Time Apache hive
Apache
References () https://github.com/apache/hive - () https://github.com/apache/hive - Product
References () https://github.com/apache/hive/commit/60027bb9c91a93affcfebd9068f064bc1f2a74c9 - () https://github.com/apache/hive/commit/60027bb9c91a93affcfebd9068f064bc1f2a74c9 - Patch
References () https://issues.apache.org/jira/browse/HIVE-26539 - () https://issues.apache.org/jira/browse/HIVE-26539 - Issue Tracking
References () https://lists.apache.org/thread/jwtr3d9yovf2wo0qlxvkhoxnwxxyzgts - () https://lists.apache.org/thread/jwtr3d9yovf2wo0qlxvkhoxnwxxyzgts - Mailing List, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2024/12/04/2 - () http://www.openwall.com/lists/oss-security/2024/12/04/2 - Mailing List, Third Party Advisory
Summary
  • (es) Apache Hive Metastore (HMS) utiliza el método SerializationUtilities#deserializeObjectWithTypeInformation al filtrar y obtener particiones, lo que no es seguro y puede provocar una ejecución de código remoto (RCE), ya que permite la deserialización de datos arbitrarios. En implementaciones reales, la vulnerabilidad solo puede ser explotada por usuarios o clientes autenticados que pudieron establecer una conexión exitosa con Metastore. Desde una perspectiva de API, cualquier código que llame al método no seguro puede ser vulnerable a menos que realice comprobaciones previas adicionales en los argumentos de entrada.
CPE cpe:2.3:a:apache:hive:4.0.0:alpha1:*:*:*:*:*:*

05 Dec 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-05 10:15

Updated : 2025-07-15 16:34


NVD link : CVE-2022-41137

Mitre link : CVE-2022-41137

CVE.ORG link : CVE-2022-41137


JSON object : View

Products Affected

apache

  • hive
CWE
CWE-502

Deserialization of Untrusted Data