This is a different CVE but is also related to Jinja templates but a
different manifestation of it. It was found and identified while doing an
audit of everything exposed in Jinja templates.

Max

On Tue, Sep 29, 2020 at 10:44 AM Ricardo Martinelli de Oliveira <
rmart...@redhat.com> wrote:

> Isn't this message sent before? I thought this vulnerability was fixed in
> 0.37.1.
>
> If not, are there any workarounds to avoid it?
>
> On Tue, Sep 29, 2020 at 2:40 PM Will Barrett <barrett.will...@gmail.com>
> wrote:
>
> > Affected Versions: Apache Superset < 0.37.2
> >
> > In the course of work on the open source project it was discovered that
> > authenticated users running queries against Hive and Presto database
> > engines could access information via a number of templated fields
> including
> > the contents of query description metadata database, the hashed version
> of
> > the authenticated users’ password, and access to connection information
> > including the plaintext password for the current connection. It would
> also
> > be possible to run arbitrary methods on the database connection object
> for
> > the Presto or Hive connection, allowing the user to bypass security
> > controls internal to Superset. This vulnerability is present in every
> > Apache Superset version < 0.37.2.
> >
> > Will Barrett
> > Member of the Project Management Committee
> > Apache Incubator Superset
> >
>
>
> --
>
> Ricardo Martinelli De Oliveira
>
> Data Engineer, AI CoE
>
> Red Hat Brazil <https://www.redhat.com/>
>
> Av. Brigadeiro Faria Lima, 3900
>
> 8th floor
>
> rmart...@redhat.com    T: +551135426125
> M: +5511970696531
> @redhatjobs <https://twitter.com/redhatjobs>   redhatjobs
> <https://www.facebook.com/redhatjobs> @redhatjobs
> <https://instagram.com/redhatjobs>
> <https://www.redhat.com/>
>

Reply via email to