apache-superset@4.0.0 vulnerabilities

A modern, enterprise-ready business intelligence web application

  • latest version

    4.1.2

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    27 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the apache-superset package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Improper Authorization

    apache-superset is a modern, enterprise-ready business intelligence web application.

    Affected versions of this package are vulnerable to Improper Authorization through the SQLLab component. An attacker can execute unauthorized write operations by crafting a specially designed SQL DML statement that is incorrectly identified as a read-only query.

    Note:

    This is only exploitable if the database connection is not set with a readonly user.

    How to fix Improper Authorization?

    Upgrade apache-superset to version 4.1.0rc2 or higher.

    [,4.1.0rc2)
    • M
    SQL Injection

    apache-superset is a modern, enterprise-ready business intelligence web application.

    Affected versions of this package are vulnerable to SQL Injection due to improper handling of certain PostgreSQL functions in the SQL parsing and authorization process. An attacker can execute unauthorized SQL commands by exploiting these engine-specific functions that are not adequately checked.

    Note: This issue is a follow-up to CVE-2024-39887 with additional disallowed PostgreSQL functions now included: query_to_xml_and_xmlschema, table_to_xml, table_to_xml_and_xmlschema.

    How to fix SQL Injection?

    Upgrade apache-superset to version 4.1.0rc2 or higher.

    [,4.1.0rc2)
    • H
    Improper Authorization

    apache-superset is a modern, enterprise-ready business intelligence web application.

    Affected versions of this package are vulnerable to Improper Authorization due to the enabled FAB_ADD_SECURITY_API setting, which is disabled by default. An attacker can manipulate role assignments and permissions by exploiting this API with lower privilege credentials.

    How to fix Improper Authorization?

    Upgrade apache-superset to version 4.1.0rc3 or higher.

    [2.0.0,4.1.0rc3)
    • L
    SQL Injection

    apache-superset is a modern, enterprise-ready business intelligence web application.

    Affected versions of this package are vulnerable to SQL Injection by using engine-specific functions that are not adequately checked. This is only exploitable if the DISALLOWED_SQL_FUNCTIONS configuration is not set to disallow critical functions.

    How to fix SQL Injection?

    Upgrade apache-superset to version 4.0.2 or higher.

    [,4.0.2)
    • M
    Arbitrary File Read

    apache-superset is a modern, enterprise-ready business intelligence web application.

    Affected versions of this package are vulnerable to Arbitrary File Read by allowing an authenticated attacker to create a MariaDB connection with local_infile enabled. The attacker can read files from the server and insert their content into a MariaDB database table by executing specific MySQL/MariaDB SQL commands.

    Note:

    This is only exploitable if both the MariaDB server and the local mysql client on the web server are set to allow for local infile.

    How to fix Arbitrary File Read?

    Upgrade apache-superset to version 3.1.3, 4.0.1 or higher.

    [,3.1.3)[4.0.0,4.0.1)