CVE-2023-40610

Improper authorization check and possible privilege escalation on Apache Superset up to but excluding 2.1.2. Using the default examples database connection that allows access to both the examples schema and Apache Superset's metadata database, an attacker using a specially crafted CTE SQL statement could change data on the metadata database. This weakness could result on tampering with the authentication/authorization data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*

History

13 Feb 2025, 17:17

Type Values Removed Values Added
CWE CWE-863
Summary Improper authorization check and possible privilege escalation on Apache Superset up to but excluding 2.1.2. Using the default examples database connection that allows access to both the examples schema and Apache Superset's metadata database, an attacker using a specially crafted CTE SQL statement could change data on the metadata database. This weakness could result on tampering with the authentication/authorization data. Improper authorization check and possible privilege escalation on Apache Superset up to but excluding 2.1.2. Using the default examples database connection that allows access to both the examples schema and Apache Superset's metadata database, an attacker using a specially crafted CTE SQL statement could change data on the metadata database. This weakness could result on tampering with the authentication/authorization data.

10 Jan 2024, 17:15

Type Values Removed Values Added
References
  • () https://github.com/orangecertcc/security-research/security/advisories/GHSA-f678-j579-4xf5 -

01 Dec 2023, 02:31

Type Values Removed Values Added
First Time Apache
Apache superset
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
References () https://lists.apache.org/thread/jvgxpk4dbxyqtsgtl4pdgbd520rc0rot - () https://lists.apache.org/thread/jvgxpk4dbxyqtsgtl4pdgbd520rc0rot - Mailing List, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2023/11/27/2 - () http://www.openwall.com/lists/oss-security/2023/11/27/2 - Mailing List, Third Party Advisory

27 Nov 2023, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-27 11:15

Updated : 2025-02-13 17:17


NVD link : CVE-2023-40610

Mitre link : CVE-2023-40610


JSON object : View

Products Affected

apache

  • superset
CWE

No CWE.