First published: Fri Nov 12 2021(Updated: )
Apache Superset up to and including 1.3.1 allowed for database connections password leak for authenticated users. This information could be accessed in a non-trivial way.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Superset | <=1.3.1 | |
pip/apache-superset | <=1.3.1 | 1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41972 refers to a vulnerability in Apache Superset up to and including version 1.3.1 that allows for the leakage of database connections passwords for authenticated users.
CVE-2021-41972 has a severity rating of medium with a CVSS score of 6.5.
An attacker can exploit CVE-2021-41972 by accessing the leaked database connections passwords to gain unauthorized access to the database or perform other malicious activities.
To protect your Apache Superset installation from CVE-2021-41972, it is recommended to upgrade to a version higher than 1.3.1, where the vulnerability has been patched.
You can find more information about CVE-2021-41972 in the references provided: [Reference 1](https://lists.apache.org/thread/xpdl2r538o695o7r9gd9qrwqb17bdd3v) and [Reference 2](https://seclists.org/oss-sec/2021/q4/106).