CVE-2023-49736

A where_in JINJA macro allows users to specify a quote, which combined with a carefully crafted statement would allow for SQL injection in Apache Superset.This issue affects Apache Superset: before 2.1.2, from 3.0.0 before 3.0.2. Users are recommended to upgrade to version 3.0.2, which fixes the issue.
References
Link Resource
http://www.openwall.com/lists/oss-security/2023/12/19/2 Mailing List Third Party Advisory
https://lists.apache.org/thread/1kf481bgs3451qcz6hfhobs7xvhp8n1p Mailing List Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*

History

28 Dec 2023, 17:16

Type Values Removed Values Added
First Time Apache
Apache superset
Summary
  • (es) Una macro Where_in JINJA permite a los usuarios especificar una cita, que combinada con una declaración cuidadosamente manipulada permitiría la inyección de SQL en Apache Superset. Este problema afecta a Apache Superset: antes de 2.1.2, desde 3.0.0 antes de 3.0.2. Se recomienda a los usuarios actualizar a la versión 3.0.2, que soluciona el problema.
References () http://www.openwall.com/lists/oss-security/2023/12/19/2 - () http://www.openwall.com/lists/oss-security/2023/12/19/2 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/1kf481bgs3451qcz6hfhobs7xvhp8n1p - () https://lists.apache.org/thread/1kf481bgs3451qcz6hfhobs7xvhp8n1p - Mailing List, Vendor Advisory
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*

19 Dec 2023, 15:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2023/12/19/2 -

19 Dec 2023, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-19 10:15

Updated : 2023-12-28 17:16


NVD link : CVE-2023-49736

Mitre link : CVE-2023-49736

CVE.ORG link : CVE-2023-49736


JSON object : View

Products Affected

apache

  • superset
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')