First published: Mon Apr 24 2023(Updated: )
Apache Superset contains an insecure default initialization of a resource vulnerability that allows an attacker to authenticate and access unauthorized resources on installations that have not altered the default configured SECRET_KEY according to installation instructions.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.0.1 | ||
Apache Superset | <=2.0.1 | |
pip/apache-superset | <2.1.0 | 2.1.0 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27524 is a vulnerability in Apache Superset versions up to and including 2.0.1 that allows attackers to authenticate and access unauthorized resources if the default configured SECRET_KEY has not been altered.
CVE-2023-27524 has a severity rating of critical with a score of 9.8 out of 10.
CVE-2023-27524 affects Apache Superset installations that have not altered the default configured SECRET_KEY according to installation instructions.
To fix CVE-2023-27524, upgrade to Apache Superset version 2.1.0 or later, as recommended by the vendor.
You can find more information about CVE-2023-27524 on the NIST National Vulnerability Database (NVD) website and the Apache Superset mailing list.