SB2023042444 - Multiple vulnerabilities in Apache Superset
Published: April 24, 2023 Updated: December 19, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Insecure default initialization of resource (CVE-ID: CVE-2023-27524)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to the application does not alter the default configured SECRET_KEY by itself. A remote attacker can authenticate and access unauthorized resources if the software installation was not performed according to vendor's instructions.
2) Information disclosure (CVE-ID: CVE-2023-30776)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote user with specific data permissions could access database connections stored passwords by requesting a specific REST API.
3) Missing Authorization (CVE-ID: CVE-2023-27525)
The vulnerability allows a remote user to gain access to sensitive information.
The vulnerability exists due to missing authorization for non-trivial methods. A remote user with Gamma role can access metadata information.
4) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2023-25504)
The disclosed vulnerability allows a remote user to perform SSRF attacks.
The vulnerability exists due to insufficient validation of user-supplied input within the import dataset feature. A remote user can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
Remediation
Install update from vendor's website.
References
- https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk
- http://www.openwall.com/lists/oss-security/2023/04/24/2
- http://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html
- http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html
- https://lists.apache.org/thread/s9w9w10mt2sngk3solwnmq5k7md53tsz
- http://www.openwall.com/lists/oss-security/2023/04/24/3
- https://lists.apache.org/thread/wpv7b17zjg2pmvpfkdd6nn8sco8y2q77
- https://lists.apache.org/thread/tdnzkocfsqg2sbbornnp9g492fn4zhtx
- http://www.openwall.com/lists/oss-security/2023/04/18/8