Improper authorization check and possible privilege escalation on Apache Superset up to but excluding 2.1.2. Using the default examples database connection that allows access to both the examples schema and Apache Superset's metadata database, an attacker using a specially crafted CTE SQL statement could change data on the metadata database. This weakness could result on tampering with the authentication/authorization data.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://lists.apache.org/thread/jvgxpk4dbxyqtsgtl4pdgbd520rc0rot | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/11/27/2 | third party advisory mailing list |
https://github.com/orangecertcc/security-research/security/advisories/GHSA-f678-j579-4xf5 |