First published: Thu Dec 12 2024(Updated: )
Improper Authorization vulnerability in Apache Superset. On Postgres analytic databases an attacker with SQLLab access can craft a specially designed SQL DML statement that is Incorrectly identified as a read-only query, enabling its execution. Non postgres analytics database connections and postgres analytics database connections set with a readonly user (advised) are not vulnerable. This issue affects Apache Superset: before 4.1.0. Users are recommended to upgrade to version 4.1.0, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/apache-superset | <4.1.0 | 4.1.0 |
Apache Superset | <4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-55633 is classified as a high-severity vulnerability due to its impact on improper authorization in Apache Superset.
To mitigate CVE-2024-55633, upgrade to Apache Superset version 4.1.0 or later.
CVE-2024-55633 affects users of Apache Superset with SQLLab access on Postgres analytic databases.
CVE-2024-55633 is an improper authorization vulnerability that can allow attackers to execute unauthorized SQL commands.
CVE-2024-55633 primarily affects Postgres databases and does not impact non-Postgres analytics databases.