Snyk has a published code exploit for this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade apache-superset
to version 2.1.0 or higher.
apache-superset is a modern, enterprise-ready business intelligence web application.
Affected versions of this package are vulnerable to Insecure Default Initialization of Resource due to the use of a default SECRET_KEY
that could be abused by attackers to authenticate and access unauthorized resources on internet-exposed installations.
Impact: An attacker who has knowledge of the secret key can sign in to the vulnerable servers as an administrator by forging a session cookie and can seize control of the systems.
Note: This issue does not affect configurations in which the default value for SECRET_KEY
config was changed.