Apache

Superset

68 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.79%
  • Veröffentlicht 16.01.2023 11:15:10
  • Zuletzt bearbeitet 07.04.2025 15:15:41

An authenticated attacker with write CSS template permissions can create a record with specific HTML tags that will not get properly escaped by the toast message displayed when a user deletes that specific CSS template record. This issue affects Apac...

  • EPSS 0.65%
  • Veröffentlicht 16.01.2023 11:15:10
  • Zuletzt bearbeitet 07.04.2025 15:15:41

An authenticated attacker with update datasets permission could change a dataset link to an untrusted site, users could be redirected to this site when clicking on that specific dataset. This issue affects Apache Superset version 1.5.2 and prior vers...

  • EPSS 3.24%
  • Veröffentlicht 16.01.2023 11:15:10
  • Zuletzt bearbeitet 07.04.2025 15:15:41

When explicitly enabling the feature flag DASHBOARD_CACHE (disabled by default), the system allowed for an unauthenticated user to access dashboard configuration metadata using a REST API Get endpoint. This issue affects Apache Superset version 1.5.2...

  • EPSS 0.24%
  • Veröffentlicht 06.07.2022 13:15:09
  • Zuletzt bearbeitet 21.11.2024 06:15:56

Apache Superset up to 1.5.1 allowed for authenticated users to access metadata information related to datasets they have no permission on. This metadata included the dataset name, columns and metrics.

  • EPSS 4.33%
  • Veröffentlicht 13.04.2022 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:55:48

Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users should update to 1.4.2 or higher which addresses this issue.

  • EPSS 75.34%
  • Veröffentlicht 01.02.2022 14:15:09
  • Zuletzt bearbeitet 21.11.2024 06:31:00

Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher.

  • EPSS 0.74%
  • Veröffentlicht 17.11.2021 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:27:27

Improper output neutralization for Logs. A specific Apache Superset HTTP endpoint allowed for an authenticated user to forge log entries or inject malicious content into logs.

  • EPSS 0.31%
  • Veröffentlicht 12.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:27:00

Apache Superset up to and including 1.3.1 allowed for database connections password leak for authenticated users. This information could be accessed in a non-trivial way.

  • EPSS 0.79%
  • Veröffentlicht 18.10.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:27:00

Apache Superset up to and including 1.3.0 when configured with ENABLE_TEMPLATE_PROCESSING on (disabled by default) allowed SQL injection when a malicious authenticated user sends an http request with a custom URL.

  • EPSS 9.09%
  • Veröffentlicht 18.10.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:07:22

Apache Superset up to and including 1.1 does not sanitize titles correctly on the Explore page. This allows an attacker with Explore access to save a chart with a malicious title, injecting html (including scripts) into the page.