First published: Thu Jun 20 2024(Updated: )
Improper Input Validation vulnerability in Apache Superset, allows for an authenticated attacker to create a MariaDB connection with local_infile enabled. If both the MariaDB server (off by default) and the local mysql client on the web server are set to allow for local infile, it's possible for the attacker to execute a specific MySQL/MariaDB SQL command that is able to read files from the server and insert their content on a MariaDB database table. This issue affects Apache Superset before version 3.1.3 and in version 4.0.0. Users are recommended to upgrade to version 4.0.1 or 3.1.3, both of which fix the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-superset | >=4.0.0<4.0.1 | 4.0.1 |
pip/apache-superset | <3.1.3 | 3.1.3 |
Apache Superset | <3.1.3 | |
Apache Superset | >=4.0.0<4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34693 is considered a medium severity vulnerability due to improper input validation in Apache Superset.
To fix CVE-2024-34693, upgrade to Apache Superset version 4.0.1 or 3.1.3.
Authenticated users of Apache Superset who can create MariaDB connections are affected by CVE-2024-34693.
An attacker could potentially create a MariaDB connection with local_infile enabled, leading to unauthorized file access.
No, local_infile is off by default for MariaDB, but can be enabled by an attacker under certain conditions.