apache-superset@2.1.1rc2 vulnerabilities
A modern, enterprise-ready business intelligence web application
-
latest version
4.1.0
-
latest non vulnerable version
-
first published
5 years ago
-
latest version published
7 days ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the apache-superset package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to SQL Injection by using engine-specific functions that are not adequately checked. This is only exploitable if the How to fix SQL Injection? Upgrade |
[,4.0.2)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Arbitrary File Read by allowing an authenticated attacker to create a MariaDB connection with Note: This is only exploitable if both the MariaDB server and the local mysql client on the web server are set to allow for local infile. How to fix Arbitrary File Read? Upgrade |
[,3.1.3)
[4.0.0,4.0.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Incorrect Authorization due to the improper handling of REST API requests. An authenticated attacker can access unauthorized metadata that they are not authorized to view by submitting a targeted request. How to fix Incorrect Authorization? Upgrade |
[,3.1.2)
[4.0.0rc1,4.0.0rc2)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Improper Authorization on dashboards and charts import. A low privilege authenticated user could import an existing dashboard or chart that they do not have access to and then modify its metadata, thereby gaining ownership of the object. Note: The access to the analytical data of these charts and dashboards would still be subject to validation based on data access privileges. How to fix Improper Authorization? Upgrade |
[,3.0.4)
[3.1.0,3.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File. A user with Alerts & Reports privileges to create Alerts can cause a malicious SQL statement to throw and error and have its contents logged. Thee error is not properly handled and can expose sensitive data. How to fix Insertion of Sensitive Information into Log File? Upgrade |
[,3.0.4)
[3.1.0rc1,3.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Improper Authorization when creating a new virtual dataset using custom roles that include "can write on dataset". This allows users to access data in other datasets to which they do not otherwise have access. How to fix Improper Authorization? Upgrade |
[,3.0.4)
[3.1.0rc1,3.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Incorrect Authorization when processing nested SQL statements in SQLLab, allowing a user to access unauthorized data. How to fix Incorrect Authorization? Upgrade |
[,3.0.4)
[3.1.0rc1,3.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to SQL Injection in an embedded context, allowing a guest user to expose information from the analytics database via chart data REST API call. How to fix SQL Injection? Upgrade |
[,3.0.4)
[3.1.0rc1,3.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the "Dashboard Title" and "Chart Title" due to improper user input sanitization. An authenticated attacker with create/update permissions could inject a malicious script or HTML snippet, leading to the execution of arbitrary code in the context of the user's browser session. Note For 2.X versions, users should change their config to include:
How to fix Cross-site Scripting (XSS)? Upgrade |
[,3.0.3)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption. An authenticated attacker can trigger this vulnerability by uploading a malicious ZIP file to import databases, dashboards, or datasets. How to fix Uncontrolled Resource Consumption? Upgrade |
[,2.1.3)
[3.0.0,3.0.2)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to SQL Injection via the How to fix SQL Injection? Upgrade |
[,2.1.3)
[3.0.0,3.0.2)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Incorrect Authorization due to improper enforcement of access controls. An authenticated Gamma user can exploit this by creating a dashboard and adding charts to it, which erroneously grants them ownership and write permissions to those charts. How to fix Incorrect Authorization? Upgrade |
[,2.1.3)
[3.0.0,3.0.2)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. An authenticated attacker can initiate multiple concurrent requests, each requesting multiple dashboard exports, leading to denial of service. How to fix Allocation of Resources Without Limits or Throttling? Upgrade |
[,2.1.3)
[3.0.0rc1,3.0.0)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Incorrect Default Permissions. An authenticated user can read configured CSS templates and annotations by exploiting the unnecessary read permissions within the Gamma role. Note: In addition to updating to the fixed version, users should run How to fix Incorrect Default Permissions? Upgrade |
[,2.1.2)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Open Redirect when the dataset link updating process is manipulated. An attacker can change a dataset link to an untrusted site by spoofing the HTTP Host header. This is only exploitable if the attacker is authenticated and has update datasets permission. How to fix Open Redirect? Upgrade |
[,3.0.0)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper payload validation and an improper REST API response type, allowing an authenticated malicious actor to store malicious code into Chart's metadata. This code could get executed when a user accesses a specific deprecated API endpoint. How to fix Cross-site Scripting (XSS)? Upgrade |
[,2.1.2)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Incorrect Authorization. An attacker can escalate privileges and tamper with authentication/authorization data by using a specially crafted CTE SQL statement. Note: This is only exploitable if the default "examples" database connection is used, which allows access to both the examples schema and the metadata database. How to fix Incorrect Authorization? Upgrade |
[,2.1.2)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Information Exposure. An authenticated attacker with read permissions on database connections metadata can access sensitive information such as the connection's username by exploiting this vulnerability. How to fix Information Exposure? Upgrade |
[,3.0.0)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Information Exposure such that by default, stack traces for errors are enabled, which results in the exposure of internal traces on REST API endpoints to users. How to fix Information Exposure? Upgrade |
[,2.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Improper Preservation of Permissions. An improper default REST API permission for Gamma users allows for an authenticated Gamma user to test database connections. How to fix Improper Preservation of Permissions? Upgrade |
[,2.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Improper Input Validation due to allowing SQLite database connections to be incorrectly registered when an attacker uses alternative driver names like sqlite+pysqlite or by using database imports. This could lead to unexpected file creation on Superset webservers. Note: If Apache Superset is using a SQLite database for its metadata (not advised for production use) it could result in more severe vulnerabilities related to confidentiality and integrity. How to fix Improper Input Validation? Upgrade |
[,2.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Deserialization of Untrusted Data. If an attacker gains write access to the Apache Superset metadata database, they could persist a specifically crafted Python object that may lead to remote code execution on Superset's web backend. How to fix Deserialization of Untrusted Data? Upgrade |
[1.5.0,2.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to improper REST API permission which allows authenticated Gamma users to test network connections. How to fix Server-side Request Forgery (SSRF)? Upgrade |
[,2.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Incorrect Authorization due to allowing an authenticated user to issue queries on database tables they may not have access to. How to fix Incorrect Authorization? Upgrade |
[,2.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Incorrect Authorization due to allowing an authenticated user to query tables that they do not have proper access to within Superset. The vulnerability can be exploited by leveraging a SQL parsing vulnerability. How to fix Incorrect Authorization? Upgrade |
[,2.1.1)
|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Access Restriction Bypass via How to fix Access Restriction Bypass? Upgrade |
[,2.1.1)
|