AVID-2026-R1249
Description
Apache Airflow Hive Provider Beeline RCE with Principal (CVE-2023-35797)
Details
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider. This issue affects Apache Airflow Apache Hive Provider: before 6.1.1.
Before version 6.1.1 it was possible to bypass the security check to RCE via principal parameter. For this to be exploited it requires access to modifying the connection details.
It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.
Reason for inclusion in AVID: CVE-2023-35797 describes an improper input validation vulnerability enabling remote code execution in Apache Airflow Hive Provider (before 6.1.1). Airflow is a workflow/orchestration tool commonly used in ML pipelines; vulnerabilities in such components affect the software supply chain for AI systems. The issue is in a software component used to build/deploy/run AI workflows, not hardware; it is a CVE-style security vulnerability with RCE. The report provides sufficient details and references.
References
- NVD entry
- https://github.com/apache/airflow/pull/31983
- https://lists.apache.org/thread/30y19ok07fw52x5hnkbhwqo3ho0wwc1y
- http://www.openwall.com/lists/oss-security/2023/07/12/3
Affected or Relevant Artifacts
- Developer: Apache Software Foundation
- Deployer: Apache Software Foundation
- Artifact Details:
| Type | Name |
|---|---|
| System | Apache Airflow Apache Hive Provider |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CWE
| ID | Description |
|---|---|
| CWE-20 | CWE-20 Improper Input Validation |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2023-07-03
- Version: 0.3.3
- AVID Entry