4.1.2
5 years ago
27 days ago
Known vulnerabilities in the apache-superset package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Improper Authorization through the SQLLab component. An attacker can execute unauthorized write operations by crafting a specially designed SQL DML statement that is incorrectly identified as a read-only query. Note: This is only exploitable if the database connection is not set with a readonly user. How to fix Improper Authorization? Upgrade | [,4.1.0rc2) |
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to SQL Injection due to improper handling of certain PostgreSQL functions in the SQL parsing and authorization process. An attacker can execute unauthorized SQL commands by exploiting these engine-specific functions that are not adequately checked. Note:
This issue is a follow-up to CVE-2024-39887 with additional disallowed PostgreSQL functions now included: How to fix SQL Injection? Upgrade | [,4.1.0rc2) |
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Improper Authorization due to the enabled How to fix Improper Authorization? Upgrade | [2.0.0,4.1.0rc3) |
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to SQL Injection by using engine-specific functions that are not adequately checked. This is only exploitable if the How to fix SQL Injection? Upgrade | [,4.0.2) |
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Arbitrary File Read by allowing an authenticated attacker to create a MariaDB connection with Note: This is only exploitable if both the MariaDB server and the local mysql client on the web server are set to allow for local infile. How to fix Arbitrary File Read? Upgrade | [,3.1.3)[4.0.0,4.0.1) |
apache-superset is a modern, enterprise-ready business intelligence web application. Affected versions of this package are vulnerable to Incorrect Authorization due to the improper handling of REST API requests. An authenticated attacker can access unauthorized metadata that they are not authorized to view by submitting a targeted request. How to fix Incorrect Authorization? Upgrade | [,3.1.2)[4.0.0rc1,4.0.0rc2) |