First published: Tue Feb 01 2022(Updated: )
Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-superset | <1.4.0 | 1.4.0 |
Apache Superset | <=1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44451 is a vulnerability in Apache Superset up to and including version 1.3.2 that allows for registered database connections password leak for authenticated users.
The password leak vulnerability in Apache Superset can be exploited by authenticated users to access the registered database connections password in a non-trivial way.
The severity of CVE-2021-44451 is medium with a CVSS score of 6.5.
To fix the password leak vulnerability in Apache Superset, users should upgrade to version 1.4.0 or higher.
You can find more information about CVE-2021-44451 on the NIST NVD website and the Apache Superset mailing list and GitHub advisory.