Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitation.
The vulnerable CookieSigner logic was introduced in Apache Hive by HIVE-9710 (1.2.0) and in Apache Spark by SPARK-14987 (2.0.0). The affected components are the following:
* org.apache.hive:hive-service
* org.apache.spark:spark-hive-thriftserver_2.11
* org.apache.spark:spark-hive-thriftserver_2.12
Metrics
Affected Vendors & Products
References
History
Tue, 24 Dec 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Mon, 23 Dec 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 23 Dec 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitation. The vulnerable CookieSigner logic was introduced in Apache Hive by HIVE-9710 (1.2.0) and in Apache Spark by SPARK-14987 (2.0.0). The affected components are the following: * org.apache.hive:hive-service * org.apache.spark:spark-hive-thriftserver_2.11 * org.apache.spark:spark-hive-thriftserver_2.12 | |
Title | Apache Hive, Apache Spark, Apache Spark: CookieSigner exposes the correct signature when message verification fails | |
Weaknesses | CWE-209 | |
References |
|
|
MITRE
Status: PUBLISHED
Assigner: apache
Published: 2024-12-23T15:26:54.477Z
Updated: 2024-12-24T01:51:23.147Z
Reserved: 2024-01-24T10:47:00.803Z
Link: CVE-2024-23945
Vulnrichment
Updated: 2024-12-23T18:03:26.179Z
NVD
Status : Awaiting Analysis
Published: 2024-12-23T16:15:05.590
Modified: 2024-12-24T02:15:05.303
Link: CVE-2024-23945
Redhat
No data.