First published: Wed Feb 28 2024(Updated: )
A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1. Users are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-superset | >=3.1.0<3.1.1 | 3.1.1 |
pip/apache-superset | <=3.0.3 | 3.0.4 |
Apache Superset | <3.0.4 | |
Apache Superset | >=3.1.0<3.1.1 | |
<3.0.4 | ||
>=3.1.0<3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24772 has been categorized with a high severity level due to the potential for unauthorized SQL injection exploits.
To fix CVE-2024-24772, upgrade your Apache Superset installation to version 3.1.1 or 3.0.4.
CVE-2024-24772 affects Apache Superset versions prior to 3.1.1 and from 3.0.3 and below.
Yes, CVE-2024-24772 can be exploited by a guest user through the chart data REST API to leak information.
CVE-2024-24772 can potentially leak sensitive information from the underlying analytics database during SQL execution errors.