CVE Published: 06/09/2023 |
CVE Updated: 27/09/2024 |
CVE Year: 2023 Source: apache |
Vendor: Apache Software Foundation |
Product: Apache Superset Status : PUBLISHED
CVE-2023-37941 Description
If an attacker gains write access to the Apache Superset metadata database, they could persist a specifically crafted Python object that may lead to remote code execution on Superset\'s web backend.
The Superset metadata db is an \'internal\' component that is typically
only accessible directly by the system administrator and the superset
process itself. Gaining access to that database should
be difficult and require significant privileges.
This vulnerability impacts Apache Superset versions 1.5.0 up to and including 2.1.0. Users are recommended to upgrade to version 2.1.1 or later.
Metrics
CVSS Version: 3.1 |
Base Score: 6.6 MEDIUM Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
l➤ Exploitability Metrics: Attack Vector (AV)* NETWORK Attack Complexity (AC)* HIGH Privileges Required (PR)* HIGH User Interaction (UI)* NONE Scope (S)* UNCHANGED
l➤ Impact Metrics: Confidentiality Impact (C)* HIGH Integrity Impact (I)* HIGH Availability Impact (A)* HIGH
Weakness Enumeration (CWE)
CWE-ID: CWE-502 CWE Name: CWE-502 Deserialization of Untrusted Data Source: Apache Software Foundation
Common Attack Pattern Enumeration and Classification (CAPEC)