First published: Tue Dec 19 2023(Updated: )
A where_in JINJA macro allows users to specify a quote, which combined with a carefully crafted statement would allow for SQL injection in Apache Superset.This issue affects Apache Superset: before 2.1.2, from 3.0.0 before 3.0.2. Users are recommended to upgrade to version 3.0.2, which fixes the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-superset | >=3.0.0<3.0.2 | 3.0.2 |
pip/apache-superset | <2.1.3 | 2.1.3 |
Apache Superset | <2.1.2 | |
Apache Superset | >=3.0.0<3.0.2 | |
<2.1.2 | ||
>=3.0.0<3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49736 is classified as a critical vulnerability due to the potential for SQL injection attacks.
To remediate CVE-2023-49736, upgrade Apache Superset to version 3.0.2 or 2.1.3.
CVE-2023-49736 affects Apache Superset versions prior to 2.1.2 and versions from 3.0.0 up to 3.0.2.
CVE-2023-49736 can facilitate SQL injection attacks, potentially allowing unauthorized access to database information.
There are no known workarounds for CVE-2023-49736, upgrading is the recommended action.