CVE-2022-41137

Apache Hive Metastore (HMS) uses SerializationUtilities#deserializeObjectWithTypeInformation method when filtering and fetching partitions that is unsafe and can lead to Remote Code Execution (RCE) since it allows the deserialization of arbitrary data. In real deployments, the vulnerability can be exploited only by authenticated users/clients that were able to successfully establish a connection to the Metastore. From an API perspective any code that calls the unsafe method may be vulnerable unless it performs additional prerechecks on the input arguments.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:hive:4.0.0:alpha1:*:*:*:*:*:*

History

15 Jul 2025, 16:34

Type Values Removed Values Added
CPE cpe:2.3:a:apache:hive:4.0.0:alpha1:*:*:*:*:*:*
First Time Apache
Apache hive
References () http://www.openwall.com/lists/oss-security/2024/12/04/2 - () http://www.openwall.com/lists/oss-security/2024/12/04/2 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/jwtr3d9yovf2wo0qlxvkhoxnwxxyzgts - () https://lists.apache.org/thread/jwtr3d9yovf2wo0qlxvkhoxnwxxyzgts - Mailing List, Vendor Advisory
References () https://issues.apache.org/jira/browse/HIVE-26539 - () https://issues.apache.org/jira/browse/HIVE-26539 - Issue Tracking
References () https://github.com/apache/hive - () https://github.com/apache/hive - Product
References () https://github.com/apache/hive/commit/60027bb9c91a93affcfebd9068f064bc1f2a74c9 - () https://github.com/apache/hive/commit/60027bb9c91a93affcfebd9068f064bc1f2a74c9 - Patch

05 Dec 2024, 17:15

Type Values Removed Values Added
CWE CWE-502

05 Dec 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-05 10:15

Updated : 2025-07-15 16:34


NVD link : CVE-2022-41137

Mitre link : CVE-2022-41137


JSON object : View

Products Affected

apache

  • hive
CWE

No CWE.