{"uuid": "12eb277f-7680-4ed5-8fc2-e908a660440a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-35797", "type": "seen", "source": "https://t.me/cibsecurity/65857", "content": "\u203c CVE-2023-35797 \u203c\n\nImproper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider.This issue affects Apache Airflow Apache Hive Provider: before 6.1.1.Before version 6.1.1 it was\u00c2\u00a0possible to bypass the security check to RCE viaprincipal parameter. For this to be\u00c2\u00a0exploited it requires access to modifying the connection details.It is recommended updating provider version to 6.1.1 in order to avoid this\u00c2\u00a0vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-03T14:22:26.000000Z"}