mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
68 lines
4.0 KiB
JSON
68 lines
4.0 KiB
JSON
{
|
|
"id": "CVE-2024-28851",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-03-15T19:15:07.410",
|
|
"lastModified": "2024-03-17T22:38:29.433",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Snowflake Hive metastore connector provides an easy way to query Hive-managed data via Snowflake. Snowflake Hive MetaStore Connector has addressed a potential elevation of privilege vulnerability in a `helper script` for the Hive MetaStore Connector. A malicious insider without admin privileges could, in theory, use the script to download content from a Microsoft domain to the local system and replace the valid content with malicious code. If the attacker then also had local access to the same system where the maliciously modified script is run, they could attempt to manipulate users into executing the attacker-controlled helper script, potentially gaining elevated privileges to the local system. The vulnerability in the script was patched on February 09, 2024, without a version bump to the Connector. User who use the helper script are strongly advised to use the latest version as soon as possible. Users unable to upgrade should avoid using the helper script."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El conector de metastore de Snowflake Hive proporciona una forma sencilla de consultar datos administrados por Hive a trav\u00e9s de Snowflake. Snowflake Hive MetaStore Connector ha abordado una posible vulnerabilidad de elevaci\u00f3n de privilegios en un \"script de ayuda\" para Hive MetaStore Connector. En teor\u00eda, un usuario interno malicioso sin privilegios de administrador podr\u00eda usar el script para descargar contenido de un dominio de Microsoft al sistema local y reemplazar el contenido v\u00e1lido con c\u00f3digo malicioso. Si el atacante tambi\u00e9n tuviera acceso local al mismo sistema donde se ejecuta el script modificado maliciosamente, podr\u00eda intentar manipular a los usuarios para que ejecuten el script auxiliar controlado por el atacante, obteniendo potencialmente privilegios elevados para el sistema local. La vulnerabilidad en el script se corrigi\u00f3 el 9 de febrero de 2024, sin un aumento de versi\u00f3n en el Conector. Se recomienda encarecidamente a los usuarios que utilicen el script auxiliar que utilicen la \u00faltima versi\u00f3n lo antes posible. Los usuarios que no puedan actualizar deben evitar utilizar el script de ayuda."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.0,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 0.3,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-269"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/snowflakedb/snowflake-hive-metastore-connector/blob/master/scripts/add_snowflake_hive_metastore_connector_script_action.sh",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/snowflakedb/snowflake-hive-metastore-connector/commit/dfbf87dff456f6bb62c927711d97316f0c71d8ca",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/snowflakedb/snowflake-hive-metastore-connector/security/advisories/GHSA-r68p-g2x9-mq7x",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |