CVE-2024-45199

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code remotely by injecting malicious parameters into JDBC URLs used by insightsoftware Hive JDBC. Attackers can exploit JNDI injection when the driver connects to databases. Organizations using affected versions of insightsoftware Hive JDBC are at risk.

💻 Affected Systems

Products:
  • insightsoftware Hive JDBC
Versions: through 2.6.13
Operating Systems: All operating systems running Java applications
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using the vulnerable Hive JDBC driver version with user-controlled JDBC URLs is affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, steal data, deploy ransomware, or pivot to other systems.

🟠

Likely Case

Database compromise leading to data theft, privilege escalation, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for data exposure from the affected database.

🌐 Internet-Facing: HIGH - If vulnerable JDBC connections are exposed to the internet, attackers can directly exploit without internal access.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit this to gain code execution on systems using the vulnerable driver.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in the GitHub gist reference. Exploitation requires the ability to control JDBC URL parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.14 or later

Vendor Advisory: https://insightsoftware.com/security-advisories/

Restart Required: Yes

Instructions:

1. Check current Hive JDBC driver version. 2. Download version 2.6.14 or later from insightsoftware. 3. Replace the vulnerable driver JAR file in your application. 4. Restart all applications using the driver.

🔧 Temporary Workarounds

Input Validation for JDBC URLs

all

Implement strict validation and sanitization of all JDBC URL parameters before passing to the driver.

Network Segmentation

all

Isolate systems using Hive JDBC driver from untrusted networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict input validation on all JDBC URL parameters to prevent injection
  • Network segmentation to isolate affected systems and restrict outbound LDAP/JNDI connections

🔍 How to Verify

Check if Vulnerable:

Check the Hive JDBC driver JAR file version. If version is 2.6.13 or earlier, the system is vulnerable.

Check Version:

java -cp hive-jdbc-*.jar com.insightsoftware.hive.jdbc.VersionChecker

Verify Fix Applied:

Verify the Hive JDBC driver JAR file has been updated to version 2.6.14 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JNDI/LDAP connection attempts from Java applications
  • Suspicious JDBC URL parameters in application logs

Network Indicators:

  • Outbound LDAP connections to unusual external IPs from systems using Hive JDBC
  • DNS queries for malicious JNDI/LDAP URLs

SIEM Query:

source="application.logs" AND "hive-jdbc" AND ("JNDI" OR "LDAP" OR "rmi://" OR "ldap://")

🔗 References

📤 Share & Export