CVE-2023-43701: Apache Superset: Stored XSS on API endpoint

Related Vulnerabilities: CVE-2023-43701  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2023-43701: Apache Superset: Stored XSS on API endpoint

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: Daniel Gaspar &lt;dpgaspar () apache org&gt;

Date: Mon, 27 Nov 2023 09:44:33 +0000

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Affected versions:

- Apache Superset before 2.1.2

Description:

Improper payload validation and an improper REST API response type, made it possible for an authenticated malicious 
actor to store malicious code into Chart's metadata, this code could get executed if a user specifically accesses a 
specific deprecated API endpoint.&nbsp;This issue affects Apache Superset versions prior to 2.1.2.&nbsp;
Users are recommended to upgrade to version 2.1.2, which fixes this issue.

Credit:

Nick Barnes, Praetorian Security Inc. (reporter)

References:

https://superset.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-43701

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

CVE-2023-43701: Apache Superset: Stored XSS on API endpoint Daniel Gaspar (Nov 27)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->