AKuzyashin opened a new issue, #32677:
URL: https://github.com/apache/superset/issues/32677

   > Hello Apache Superset team,
   > 
   > I would like to highlight a potential remaining attack vector involving 
the extras.where parameter.
   > 
   > It appears that passing unsanitized user input directly into extras.where 
or extras.having (using  /api/v1/chart/data ) could allow:
   > 
   > SQL Injection: If the input is interpolated into raw SQL without 
parameterization.
   > SSTI (Server-Side Template Injection): If the input is processed via 
Jinja2 templates without proper sandboxing/validation.
   > Example Scenario:
   > A malicious actor could craft a WHERE clause like:
   > 
   > `1=1; DELETE FROM your_table; -- `
   > 
   > Or leverage Jinja2 directives (if templates are enabled):
   > `{{ 4*'foo' }}`
   > 
   > Let me know if further details or a PoC would be helpful.
   > 
   > @rusackas  
   
    _Originally posted by @AKuzyashin in 
[#22960](https://github.com/apache/superset/issues/22960#issuecomment-2720254227)_


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to