First published: Wed Sep 06 2023(Updated: )
If an attacker gains write access to the Apache Superset metadata database, they could persist a specifically crafted Python object that may lead to remote code execution on Superset's web backend. The Superset metadata db is an 'internal' component that is typically only accessible directly by the system administrator and the superset process itself. Gaining access to that database should be difficult and require significant privileges. This vulnerability impacts Apache Superset versions 1.5.0 up to and including 2.1.0. Users are recommended to upgrade to version 2.1.1 or later.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Superset | >=1.5.0<=2.1.0 | |
pip/apache-superset | >=1.5.0<=2.1.0 | 2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37941 is a vulnerability in Apache Superset that allows an attacker with write access to the metadata database to execute remote code.
Apache Superset versions 1.5.0 up to and including 2.1.0 are affected by CVE-2023-37941.
CVE-2023-37941 has a severity rating of 9.8 (Critical).
If an attacker gains write access to the Apache Superset metadata database, they can persist a specially crafted Python object that may lead to remote code execution.
To mitigate CVE-2023-37941, it is recommended to upgrade to a version of Apache Superset that is not affected, such as version 2.1.1 or later.