- Description
- A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1. Users are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue.
- Source
- security@apache.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "61A22FBB-3B48-450E-890E-47AD28B387CF",
"versionEndExcluding": "3.0.4"
},
{
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8",
"versionEndExcluding": "3.1.1",
"versionStartIncluding": "3.1.0"
}
],
"operator": "OR"
}
]
}
]