#VU71205 SQL injection in Apache Superset


Published: 2023-01-17

Vulnerability identifier: #VU71205

Vulnerability risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-41971

CWE-ID: CWE-89

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Apache Superset
Web applications / Other software

Vendor: Apache Foundation

Description

The vulnerability allows a remote user to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote user can send a specially crafted HTTP request to the custom URL and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability requires that the Apache Superset is configured with enabled ENABLE_TEMPLATE_PROCESSIN option (disabled by default).

Mitigation
Install update from vendor's website.

Vulnerable software versions

Apache Superset: 1.0.0 - 1.3.0


External links
http://lists.apache.org/thread.html/rf7292731268c6c6e2196ae1583e32ac7189385364268f8d9215e8e6d%40%3Cdev.superset.apache.org%3E


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability