Headline
GHSA-92qf-8gh3-gwcm: Apache Superset: Improper SQL authorisation, parse not checking for specific postgres functions
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Apache Superset. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset’s SQL authorization. This issue is a follow-up to CVE-2024-39887 with additional disallowed PostgreSQL functions now included: query_to_xml_and_xmlschema, table_to_xml, table_to_xml_and_xmlschema.
This issue affects Apache Superset: <4.1.0.
Users are recommended to upgrade to version 4.1.0, which fixes the issue or add these Postgres functions to the config set DISALLOWED_SQL_FUNCTIONS.
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-53947
Apache Superset: Improper SQL authorisation, parse not checking for specific postgres functions
Low severity GitHub Reviewed Published Dec 9, 2024 to the GitHub Advisory Database • Updated Dec 9, 2024
Package
pip apache-superset (pip)
Affected versions
< 4.1.0
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Apache Superset. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset’s SQL authorization. This issue is a follow-up to CVE-2024-39887 with additional disallowed PostgreSQL functions now included: query_to_xml_and_xmlschema, table_to_xml, table_to_xml_and_xmlschema.
This issue affects Apache Superset: <4.1.0.
Users are recommended to upgrade to version 4.1.0, which fixes the issue or add these Postgres functions to the config set DISALLOWED_SQL_FUNCTIONS.
References
- https://nvd.nist.gov/vuln/detail/CVE-2024-53947
- https://lists.apache.org/thread/hj3gfsjh67vqw12nlrshlsym4bkopjmn
- apache/superset@0e00282
Published to the GitHub Advisory Database
Dec 9, 2024