Loading HuntDB...

GHSA-77pm-w3hx-f8mj

GitHub Security Advisory

Apache Hive and Spark: CookieSigner exposes the correct signature when message verification fails

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitation.

The vulnerable CookieSigner logic was introduced in Apache Hive by HIVE-9710 (1.2.0) and in Apache Spark by SPARK-14987 (2.0.0). The affected components are the following:
* org.apache.hive:hive-service
* org.apache.spark:spark-hive-thriftserver_2.11
* org.apache.spark:spark-hive-thriftserver_2.12

Affected Packages

Maven org.apache.hive:hive-service
Affected versions: 1.2.0 (fixed in 4.0.0)
Maven org.apache.spark:spark-hive-thriftserver_2.11
Affected versions: 0 (last affected: 2.4.8)
Maven org.apache.spark:spark-hive-thriftserver_2.12
Affected versions: 0 (fixed in 3.4.2)

Related CVEs

Key Information

GHSA ID
GHSA-77pm-w3hx-f8mj
Published
December 23, 2024 6:30 PM
Last Modified
December 26, 2024 8:09 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.apache.hive:hive-service
GitHub Reviewed
✓ Yes

Dataset

Last updated: November 23, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.