apache-superset@3.1.0rc2 vulnerabilities

A modern, enterprise-ready business intelligence web application

Direct Vulnerabilities

Known vulnerabilities in the apache-superset package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
SQL Injection

apache-superset is a modern, enterprise-ready business intelligence web application.

Affected versions of this package are vulnerable to SQL Injection by using engine-specific functions that are not adequately checked. This is only exploitable if the DISALLOWED_SQL_FUNCTIONS configuration is not set to disallow critical functions.

How to fix SQL Injection?

Upgrade apache-superset to version 4.0.2 or higher.

[,4.0.2)
  • M
Arbitrary File Read

apache-superset is a modern, enterprise-ready business intelligence web application.

Affected versions of this package are vulnerable to Arbitrary File Read by allowing an authenticated attacker to create a MariaDB connection with local_infile enabled. The attacker can read files from the server and insert their content into a MariaDB database table by executing specific MySQL/MariaDB SQL commands.

Note:

This is only exploitable if both the MariaDB server and the local mysql client on the web server are set to allow for local infile.

How to fix Arbitrary File Read?

Upgrade apache-superset to version 3.1.3, 4.0.1 or higher.

[,3.1.3) [4.0.0,4.0.1)
  • M
Incorrect Authorization

apache-superset is a modern, enterprise-ready business intelligence web application.

Affected versions of this package are vulnerable to Incorrect Authorization due to the improper handling of REST API requests. An authenticated attacker can access unauthorized metadata that they are not authorized to view by submitting a targeted request.

How to fix Incorrect Authorization?

Upgrade apache-superset to version 3.1.2, 4.0.0rc2 or higher.

[,3.1.2) [4.0.0rc1,4.0.0rc2)
  • M
Insertion of Sensitive Information into Log File

apache-superset is a modern, enterprise-ready business intelligence web application.

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File. A user with Alerts & Reports privileges to create Alerts can cause a malicious SQL statement to throw and error and have its contents logged. Thee error is not properly handled and can expose sensitive data.

How to fix Insertion of Sensitive Information into Log File?

Upgrade apache-superset to version 3.0.4, 3.1.1 or higher.

[,3.0.4) [3.1.0rc1,3.1.1)
  • M
Improper Authorization

apache-superset is a modern, enterprise-ready business intelligence web application.

Affected versions of this package are vulnerable to Improper Authorization when creating a new virtual dataset using custom roles that include "can write on dataset". This allows users to access data in other datasets to which they do not otherwise have access.

How to fix Improper Authorization?

Upgrade apache-superset to version 3.0.4, 3.1.1 or higher.

[,3.0.4) [3.1.0rc1,3.1.1)
  • M
Incorrect Authorization

apache-superset is a modern, enterprise-ready business intelligence web application.

Affected versions of this package are vulnerable to Incorrect Authorization when processing nested SQL statements in SQLLab, allowing a user to access unauthorized data.

How to fix Incorrect Authorization?

Upgrade apache-superset to version 3.0.4, 3.1.1 or higher.

[,3.0.4) [3.1.0rc1,3.1.1)
  • M
SQL Injection

apache-superset is a modern, enterprise-ready business intelligence web application.

Affected versions of this package are vulnerable to SQL Injection in an embedded context, allowing a guest user to expose information from the analytics database via chart data REST API call.

How to fix SQL Injection?

Upgrade apache-superset to version 3.0.4, 3.1.1 or higher.

[,3.0.4) [3.1.0rc1,3.1.1)