Lucene search

K
githubGitHub Advisory DatabaseGHSA-HCR7-CQWC-Q5GQ
HistoryJun 20, 2024 - 9:30 a.m.

Apache Superset server arbitrary file read

2024-06-2009:30:59
CWE-20
GitHub Advisory Database
github.com
1
apache superset
arbitrary file read
vulnerability
improper input validation
mariadb
connection
local infile
sql command
file read
upgrade
software

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Improper Input Validation vulnerability in Apache Superset, allows for an authenticated attacker to create a MariaDB connection with local_infile enabled. If both the MariaDB server (off by default) and the local mysql client on the web server are set to allow for local infile, it’s possible for the attacker to execute a specific MySQL/MariaDB SQL command that is able to read files from the server and insert their content on a MariaDB database table. This issue affects Apache Superset before version 3.1.3 and in version 4.0.0.

Users are recommended to upgrade to version 4.0.1 or 3.1.3, both of which fix the issue.

Affected configurations

Vulners
Node
apachesupersetRange<4.0.1
OR
apachesupersetRange<3.1.3

6.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-HCR7-CQWC-Q5GQ