First published: Fri Mar 05 2021(Updated: )
Apache Superset up to and including 0.38.0 allowed the creation of a Markdown component on a Dashboard page for describing chart's related information. Abusing this functionality, a malicious user could inject javascript code executing unwanted action in the context of the user's browser. The javascript code will be automatically executed (Stored XSS) when a legitimate user surfs on the dashboard page. The vulnerability is exploitable creating a “div” section and embedding in it a “svg” element with javascript code.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Superset | <=0.38.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27907 is a vulnerability in Apache Superset up to and including version 0.38.0 that allows a malicious user to inject JavaScript code on a Dashboard page.
CVE-2021-27907 has a severity keyword of 'medium' and a severity value of 5.4.
To fix CVE-2021-27907, update to version 0.38.1 of Apache Superset.
The CWE of CVE-2021-27907 is CWE-79 (Cross-Site Scripting).
More information about CVE-2021-27907 can be found at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-27907), [Apache Mailing List Thread 1](https://lists.apache.org/thread.html/r09293fb09f1d617f0d2180c42210e739e2211f8da9bc5c1873bea67a%40%3Cdev.superset.apache.org%3E), [Apache Mailing List Thread 2](https://lists.apache.org/thread.html/r09293fb09f1d617f0d2180c42210e739e2211f8da9bc5c1873bea67a@%3Cdev.superset.apache.org%3E).