9.8
CVSSv3

CVE-2023-27524

Published: 24/04/2023 Updated: 08/04/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an malicious user to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache superset

Vendor Advisories

Check Point Reference: CPAI-2023-1350 Date Published: 13 Dec 2023 Severity: Critical ...

Exploits

Apache Superset version 200 suffers from an authentication bypass vulnerability ...
Apache Superset versions 200 and below utilize Flask with a known default secret key which is used to sign HTTP cookies These cookies can therefore be forged If a user is able to login to the site, they can decode the cookie, set their user_id to that of an administrator, and re-sign the cookie This valid cookie can then be used to login as th ...

Github Repositories

Apahce-Superset身份认证绕过漏洞(CVE-2023-27524)检测工具

Superset_auth_bypass_check Apahce-Superset身份认证绕过漏洞(CVE-2023-27524)检测工具 修复时间:202383 修复由于硬编码session时间过期导致的session失效,引用flask_session_cookie_manager工具生成实时session进行检测。 修复由于未禁用重定向导致跳转/login/匹配状态码为200的bug 感谢nplookges师傅的反馈 开发环

CVE-2023-27524 Apache Superset Auth Bypass (CVE-2023-27524) Reference nvdnistgov/vuln/detail/CVE-2023-27524 githubcom/horizon3ai/CVE-2023-27524 wwwhorizon3ai/cve-2023-27524-insecure-default-configuration-in-apache-superset-leads-to-remote-code-execution/

Apache Superset Auth Bypass Vulnerability CVE-2023-27524.

CVE-2023-27524 Description POC for CVE-2023-27524: Apache Superset Auth Bypass Vulnerability create by antx at 2023-04-27 Detail Session Validation attacks in Apache Superset versions up to and including 201 Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and acces

presentation report 2023 Nuclei githubcom/projectdiscovery/nuclei Nuclei templates PD githubcom/projectdiscovery/nuclei-templates Cent githubcom/xm1k3/cent​ Guide to Finding Bugs With Nuclei blogprojectdiscoveryio/ultimate-nuclei-guide/ Run Nuclei &amp; other ProjectDiscovery tools in Docker blogprojectdiscoveryio/how-to-run-

CVE-2023-27524

CVE-2023-27524 CVE-2023-27524

A POC for the all new CVE-2023-27524 which allows for authentication bypass and gaining access to the admin dashboard.

CVE-2023-27524: Apache Superset Auth Bypass Script to check if an Apache Superset server is vulnerable to (CVE-2023-27524) and if it is vulnerable then, forge a session cookie with the user_id = 1 which is usually the admin user allowing for authentication bypass and gaining access to the dashboard Currently, there are about 3000 servers world-wide running Apache Superset Usa

Perform With Apache-SuperSet Leaked Token [CSRF]

CVE-2023-27524 Insecure Default Configuration in Apache Superset Leads to Remote Code Execution Screenshot Requirements Python37+ Supported Os Linuxer Wingays Get start with $ git clone githubcom/Pari-Malam/CVE-2023-27524 $ cd CVE-2023-27524 $ pip/pip3 install -r requirementstxt $ python/python3 supersetpy Footprints No

A collection of publicly available POCs and exploits but proxied through Burp Suite.

ButProxied A collection of publicly available POCs and exploits but proxied through Burp Suite By proxying your POCs and exploits you can better understand how an attack is being carried out Additionally, you should always be logging your traffic somewhere right? ToC CVE-2023-27524: Apache Superset Auth Bypass original - githubcom/horizon3ai/CVE-2023-27524

superset study

README superset supersetapacheorg Redush redashio superset:210の構築 注意 apach:201以下のバージョンには脆弱性あり デフォルトのシークレットキーを使っている場合 CVE-2023-27524 (CVSS:89) PASSWORDやSECRET_KEYは適切に管理してください。 構築手順 docker compose up -d /superset/init

CVE-2023-27524: Apache Superset Auth Bypass and RCE Apache Superset, a widely used open-source tool for data visualization and exploration, has been identified as having potential security weaknesses that could lead to authentication bypass and remote code execution (RCE) These vulnerabilities could empower malicious actors to acquire administrative privileges on the targeted

Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset

CVE-2023-27524: Apache Superset Auth Bypass Script to check if an Apache Superset server is running with an insecure default configuration (CVE-2023-27524) The script checks if a Superset server's session cookies are signed with any well-known default Flask SECRET_KEYs The --validate flag can be used to validate exploitability by enumerating databases using the Superset

presentation report 2023 Nuclei githubcom/projectdiscovery/nuclei Nuclei templates PD githubcom/projectdiscovery/nuclei-templates Cent githubcom/xm1k3/cent​ Guide to Finding Bugs With Nuclei blogprojectdiscoveryio/ultimate-nuclei-guide/ Run Nuclei &amp; other ProjectDiscovery tools in Docker blogprojectdiscoveryio/how-to-run-

Awvs Scanner、fahai

AWVS Update InfO 本仓库及相关资源仅供个人测试,请勿用于非法用途 This warehouse and related resources are for personal testing only, please do not use them for illegal purposes Latest 239231020153 New security checks New Security Check: CVE-2023-20198 New Security Check: CVE-2023-22515 Improvements Multiple improvements to the SSL Engine Impr

Apache Superset 默认SECRET_KEY 漏洞(CVE-2023-27524)

Apache-Superset-SECRET_KEY-CVE-2023-27524-

Awvs Scanner、fahai

AWVS Update InfO 本仓库及相关资源仅供个人测试,请勿用于非法用途 This warehouse and related resources are for personal testing only, please do not use them for illegal purposes Latest 239231020153 New security checks New Security Check: CVE-2023-20198 New Security Check: CVE-2023-22515 Improvements Multiple improvements to the SSL Engine Impr

CVE-2023-27524

Research-CVE-2023-27524 Giải Sinh viên An Toàn Thông Tin Asean tạm thời kết thúc, team MSEC_HUNT3R của mình đạt giải nhì bảng Jeopardy, tâm trạng mình vừa vui vừa buồn vì web năm nay không đạt được kì vọng của mình, nhưng mà thôi cũng có m

自己为了方便写的一些漏洞poc,如果有需要可以自取

vul_poc 自己为了方便写的一些漏洞poc,如果有需要可以自取 目前收录: 1通达OA header绕过登录漏洞 tongda_oa_header_bypasspy 2泛微OA xmlrpcServlet接口任意文件读取漏洞 ecology-xmlrpcservlet-readfilepy 3superset未授权访问漏洞(CVE-2023-27524) CVE-2023-27524py 4officeWeb365 Indexs接口存在任意

Perform With Apache-SuperSet Leaked Token [CSRF]

CVE-2023-27524 Insecure Default Configuration in Apache Superset Leads to Remote Code Execution Screenshot Requirements Python37+ Supported Os Linuxer Wingays Get start with $ git clone githubcom/Pari-Malam/CVE-2023-27524 $ cd CVE-2023-27524 $ pip/pip3 install -r requirementstxt $ python/python3 supersetpy Footprints No

Recent Articles

Apache Superset: A story of insecure default keys, thousands of vulnerable systems, few paying attention
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Two out of three public-facing app instances open to hijacking

Apache Superset until earlier this year shipped with an insecure default configuration that miscreants could exploit to login and take over the data visualization application, steal data, and execute malicious code. The open source application, based on Python's Flask framework, defaulted to a publicly known secret key: In an advisory on Tuesday, security firm Horizon3.ai explained that when a user logs into a Superset instance, the web application sends a session cookie with a user identifier b...