[ 
https://issues.apache.org/jira/browse/HIVE-27410?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17731498#comment-17731498
 ] 

Stamatis Zampetakis commented on HIVE-27410:
--------------------------------------------

[~yeachan153] There is work in progress in HIVE-27102. Calcite upgrades are 
complicated so the latter may take a while till it gets resolved.

> Calcite upgrade to 1.32.0 to fix CVE-2022-39135
> -----------------------------------------------
>
>                 Key: HIVE-27410
>                 URL: https://issues.apache.org/jira/browse/HIVE-27410
>             Project: Hive
>          Issue Type: Task
>            Reporter: Diksha
>            Priority: Major
>
> In Apache Calcite prior to version 1.32.0 the SQL operators EXISTS_NODE, 
> EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE do not restrict XML External 
> Entity references in their configuration, which makes them vulnerable to a 
> potential XML External Entity (XXE) attack. Therefore any client exposing 
> these operators, typically by using Oracle dialect (the first three) or MySQL 
> dialect (the last one), is affected by this vulnerability (the extent of it 
> will depend on the user under which the application is running). From Apache 
> Calcite 1.32.0 onwards, Document Type Declarations and XML External Entity 
> resolution are disabled on the impacted operators.
>  
> It is recommended to upgrade to version 1.32.0 to fix CVE-2022-39135.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to