This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Apache Polaris fails to escape table/namespace names in GCS Credential Access Boundary (CAB) CEL expressions. π **Consequences**: Short-lived, single-table GCS credentials become **bucket-wide**.β¦
π‘οΈ **CWE-917**: Improper Neutralization of Special Elements used in an Expression Language Statement. π **Flaw**: The code inserts namespace/table identifiers directly into CEL expressions **without escaping**.β¦
π’ **Vendor**: Apache Software Foundation. π¦ **Product**: Apache Polaris. π **Version**: Confirmed in **1.4.0**. β οΈ **Scope**: Any deployment using GCS with Polaris, especially those with broad catalog permissions.
Q4What can hackers do? (Privileges/Data)
π **Attacker Actions**: - List/Read metadata of **other tables**. - Create/Delete objects in **other table prefixes**. - Access **unrelated external prefixes** in the same bucket. - Effectively gain **bucket-wide** readβ¦
π« **Public Exp?**: No public PoC or wild exploitation code available yet. π **Status**: Confirmed via private testing on Polaris 1.4.0. The advisory link is available, but no automated exploit tools are circulating.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: 1. Check if you use **Apache Polaris** with **GCS**. 2. Review if table/namespace names allow special characters (like `'`). 3. Monitor GCS logs for unexpected access from Polaris service accounts. 4.β¦
π οΈ **Fix**: Official advisory released on **2026-05-04**. π₯ **Action**: Update to the patched version of Apache Polaris immediately. The vendor has acknowledged the issue and provided a fix path.
Q9What if no patch? (Workaround)
π§ **Workaround**: If patching is delayed, **restrict Polaris RBAC** to minimum permissions. Avoid using special characters (especially single quotes) in namespace/table names.β¦
π₯ **Priority**: **CRITICAL**. CVSS Score is high (AV:N/AC:L/PR:L/S:C/C:H/I:H/A:H). Since it grants bucket-wide access from a single table request, the impact is severe.β¦