[ https://issues.apache.org/jira/browse/HIVE-28693?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17910278#comment-17910278 ]
Basapuram Kumar commented on HIVE-28693: ---------------------------------------- PR - [https://github.com/apache/hive/pull/5597] > Bump Atlas to 2.4.0 to fix CVE's > -------------------------------- > > Key: HIVE-28693 > URL: https://issues.apache.org/jira/browse/HIVE-28693 > Project: Hive > Issue Type: Improvement > Reporter: Basapuram Kumar > Assignee: Basapuram Kumar > Priority: Major > Labels: pull-request-available > > *Issue* > The current version of Hive uses Apache Atlas 2.3.0, which transitively > depends on Spring Framework-5.3.21. This specific version of the Spring > Framework is vulnerable to CVE-2023-20863. > *Root Cause:* > The vulnerability exists due to the dependency on Apache Atlas 2.3.0, which > includes the outdated and vulnerable version of the Spring Framework (5.3.21). > *Resolution Suggestion:* > To address CVE-2023-20863, it is recommended to upgrade Apache Atlas to > version 2.4.0, which includes an updated and secure version of the Spring > Framework-5.3.39. > > [CVE-2023-20863|https://nvd.nist.gov/vuln/detail/CVE-2023-20863] Description > ``` > In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , > it is possible for a user to provide a specially crafted SpEL expression that > may cause a denial-of-service (DoS) condition. > ```` > By upgrading Atlas-2.4.0, it used *springframework-5.3.39* > After upgrading atlas to 2.4.0, here is the dependency tree, which uses > *atlas* to *5.3.39* > {code:java} > [INFO] +- org.apache.atlas:atlas-intg:jar:2.4.0:compile > [INFO] | +- javax.inject:javax.inject:jar:1:compile > [INFO] | \- org.springframework:spring-context:jar:5.3.39:compile > [INFO] | +- org.springframework:spring-aop:jar:5.3.39:compile > [INFO] | +- org.springframework:spring-beans:jar:5.3.39:compile > [INFO] | +- org.springframework:spring-core:jar:5.3.39:compile > [INFO] | | \- org.springframework:spring-jcl:jar:5.3.39:compile > [INFO] | \- org.springframework:spring-expression:jar:5.3.39:compile > {code} > > Atlas spring framework used link is here - > [https://github.com/apache/atlas/blob/4787b753271718d0b06cf6545f331f9a12ce1f63/pom.xml#L179C1-L180C1] > Upgrading to *Apache Atlas 2.4.0* will not only resolve the vulnerability but > also ensure alignment with {*}Apache Hive{*}, which uses {*}Spring Framework > 5.3.39{*}. This version of Spring Framework is included transitively by Hive. > The same has suggested > [here|https://github.com/basapuram-kumar/hive/blob/b7a3e8b87d909edd7fc4f939ff87bbadddd61c06/pom.xml#L230C61-L230C124] -- This message was sent by Atlassian Jira (v8.20.10#820010)