Vulnerability Description
Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unauthorized user having access to the directory can read the sensitive information written into this file. Users are recommended to upgrade to version 4.0.1, which fixes this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Hive | >= 1.1.0, < 4.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/apache/hiveProduct
- https://github.com/apache/hive/commit/20106e254527f7d71b2e34455c4322e14950c620Patch
- https://issues.apache.org/jira/browse/HIVE-28134Issue Tracking
- https://lists.apache.org/thread/h27ohpyrqf9w1m3c0tqr7x8jg59rcrv6Mailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2025/01/28/4Mailing ListThird Party Advisory
FAQ
What is CVE-2024-29869?
CVE-2024-29869 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unauthorized user having access to the...
How severe is CVE-2024-29869?
CVE-2024-29869 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-29869?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Hive.