Home » Database

AVID-2026-R1249

Description

Apache Airflow Hive Provider Beeline RCE with Principal (CVE-2023-35797)

Details

Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider. This issue affects Apache Airflow Apache Hive Provider: before 6.1.1.

Before version 6.1.1 it was possible to bypass the security check to RCE via principal parameter. For this to be exploited it requires access to modifying the connection details.

It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.

Reason for inclusion in AVID: CVE-2023-35797 describes an improper input validation vulnerability enabling remote code execution in Apache Airflow Hive Provider (before 6.1.1). Airflow is a workflow/orchestration tool commonly used in ML pipelines; vulnerabilities in such components affect the software supply chain for AI systems. The issue is in a software component used to build/deploy/run AI workflows, not hardware; it is a CVE-style security vulnerability with RCE. The report provides sufficient details and references.

References

Affected or Relevant Artifacts

  • Developer: Apache Software Foundation
  • Deployer: Apache Software Foundation
  • Artifact Details:
TypeName
SystemApache Airflow Apache Hive Provider

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CWE

IDDescription
CWE-20CWE-20 Improper Input Validation

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2023-07-03
  • Version: 0.3.3
  • AVID Entry