First published: Tue Jan 23 2024(Updated: )
A stored cross-site scripting (XSS) vulnerability exists in Apache Superset before 3.0.3. An authenticated attacker with create/update permissions on charts or dashboards could store a script or add a specific HTML snippet that would act as a stored XSS. For 2.X versions, users should change their config to include: TALISMAN_CONFIG = { "content_security_policy": { "base-uri": ["'self'"], "default-src": ["'self'"], "img-src": ["'self'", "blob:", "data:"], "worker-src": ["'self'", "blob:"], "connect-src": [ "'self'", " https://api.mapbox.com" https://api.mapbox.com" ;, " https://events.mapbox.com" https://events.mapbox.com" ;, ], "object-src": "'none'", "style-src": [ "'self'", "'unsafe-inline'", ], "script-src": ["'self'", "'strict-dynamic'"], }, "content_security_policy_nonce_in": ["script-src"], "force_https": False, "session_cookie_secure": False, }
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-superset | <3.0.3 | 3.0.3 |
Apache Superset | <3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49657 has been classified as a stored cross-site scripting (XSS) vulnerability which can be exploited by authenticated attackers.
To fix CVE-2023-49657, upgrade Apache Superset to version 3.0.3 or later.
Users of Apache Superset versions prior to 3.0.3 who have create or update permissions on charts or dashboards are affected.
CVE-2023-49657 allows authenticated attackers to execute stored XSS attacks by inserting malicious scripts or HTML in charts and dashboards.
There are no known workarounds for CVE-2023-49657; the best mitigation is to update to the fixed version.