Affected versions:

- Apache Superset before 2.1.2

Description:

Improper payload validation and an improper REST API response type, made it 
possible for an authenticated malicious actor to store malicious code into 
Chart's metadata, this code could get executed if a user specifically accesses 
a specific deprecated API endpoint. This issue affects Apache Superset versions 
prior to 2.1.2. 
Users are recommended to upgrade to version 2.1.2, which fixes this issue.

Credit:

Nick Barnes, Praetorian Security Inc. (reporter)

References:

https://superset.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-43701

Reply via email to