Arbitrary Code Execution Affecting apache-superset package, versions [,0.34.0)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-APACHESUPERSET-1066242
- published 1 Feb 2021
- disclosed 1 Feb 2021
- credit Unknown
How to fix?
Upgrade apache-superset
to version 0.34.0 or higher.
Overview
apache-superset is a modern, enterprise-ready business intelligence web application.
Affected versions of this package are vulnerable to Arbitrary Code Execution. Crafted yaml
files could lead to code execution.
For example: code_exec: !!python/object/apply:subprocess.check_output ['ls']
An arbitrary code execution can happen here also due to clickjacking attacks, that can happen because there is no default XFO header.
References
CVSS Scores
version 3.1