<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2023-40610: Apache Superset: Privilege escalation with default examples database
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Daniel Gaspar <dpgaspar () apache org>
Date: Mon, 27 Nov 2023 09:31:05 +0000
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Affected versions:
- Apache Superset before 2.1.2
Description:
Improper authorization check and possible privilege escalation on Apache Superset up to but excluding 2.1.2. Using the
default examples database connection that allows access to both the examples schema and Apache Superset's metadata
database, an attacker using a specially crafted CTE SQL statement could change data on the metadata database. This
weakness could result on tampering with the authentication/authorization data.
Credit:
LEXFO for Orange Innovation and Orange CERT-CC at Orange group (finder)
References:
https://superset.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-40610
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2023-40610: Apache Superset: Privilege escalation with default examples database Daniel Gaspar (Nov 27)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->