NA

CVE-2023-27524

Vulnerability Summary

Apache Superset versions 2.0.0 and below utilize Flask with a known default secret key which is used to sign HTTP cookies. These cookies can therefore be forged. If a user is able to login to the site, they can decode the cookie, set their user_id to that of an administrator, and re-sign the cookie. This valid cookie can then be used to login as the targeted user. From there the Superset database is mounted, and credentials are pulled. A dashboard is then created. Lastly a pickled python payload can be set for that dashboard within Superset's database which will trigger the remote code execution. An attempt to clean up ALL of the dashboard key values and reset them to their previous values happens during the cleanup phase.

Exploits

Apache Superset versions 200 and below utilize Flask with a known default secret key which is used to sign HTTP cookies These cookies can therefore be forged If a user is able to login to the site, they can decode the cookie, set their user_id to that of an administrator, and re-sign the cookie This valid cookie can then be used to login as th ...