First published: Mon Jan 16 2023(Updated: )
Two legacy REST API endpoints for approval and request access are vulnerable to cross site request forgery. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Superset | <=1.5.2 | |
Apache Superset | =2.0.0 | |
Apache Superset | =2.0.0-rc1 | |
Apache Superset | =2.0.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43719 is a vulnerability in Apache Superset versions 1.5.2 and prior, and version 2.0.0, where two legacy REST API endpoints for approval and request access are vulnerable to cross-site request forgery (CSRF).
CVE-2022-43719 affects Apache Superset versions 1.5.2 and prior, and version 2.0.0.
The severity of CVE-2022-43719 is high with a CVSS score of 8.8.
To fix CVE-2022-43719, it is recommended to update Apache Superset to the latest version available, which addresses the vulnerability.
More information about CVE-2022-43719 can be found at the following URL: [https://lists.apache.org/thread/xc309h2dphrkg33154djf3nqlh2xc1c0]