Lucene search

K
ApacheSuperset

7 matches found

CVE
CVE
added 2020/09/30 9:15 p.m.76 views

CVE-2020-13952

In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the aut...

8.1CVSS7.7AI score0.00125EPSS
CVE
CVE
added 2021/10/18 3:15 p.m.69 views

CVE-2021-41971

Apache Superset up to and including 1.3.0 when configured with ENABLE_TEMPLATE_PROCESSING on (disabled by default) allowed SQL injection when a malicious authenticated user sends an http request with a custom URL.

8.8CVSS8.9AI score0.00909EPSS
CVE
CVE
added 2020/09/17 1:15 p.m.60 views

CVE-2020-13948

While investigating a bug report on Apache Superset, it was determined that an authenticated user could craft requests via a number of templated text fields in the product that would allow arbitrary access to Python’s os package in the web application process in versions

8.8CVSS8.6AI score0.00619EPSS
CVE
CVE
added 2023/01/16 11:15 a.m.59 views

CVE-2022-43719

Two legacy REST API endpoints for approval and request access are vulnerable to cross site request forgery. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.

8.8CVSS8.6AI score0.00239EPSS
CVE
CVE
added 2023/11/27 11:15 a.m.50 views

CVE-2023-40610

Improper authorization check and possible privilege escalation on Apache Superset up to but excluding 2.1.2. Using the default examples database connection that allows access to both the examples schema and Apache Superset's metadata database, an attacker using a specially crafted CTE SQL statement...

8.8CVSS7.6AI score0.0022EPSS
CVE
CVE
added 2025/05/13 9:15 a.m.47 views

CVE-2025-27696

Incorrect Authorization vulnerability in Apache Superset allows ownership takeover of dashboards, charts or datasets by authenticated users with read permissions. This issue affects Apache Superset: through 4.1.1. Users are recommended to upgrade to version 4.1.2 or above, which fixes the issue.

8.8CVSS8.7AI score0.00017EPSS
CVE
CVE
added 2023/12/19 10:15 a.m.40 views

CVE-2023-49736

A where_in JINJA macro allows users to specify a quote, which combined with a carefully crafted statement would allow for SQL injection in Apache Superset.This issue affects Apache Superset: before 2.1.2, from 3.0.0 before 3.0.2. Users are recommended to upgrade to version 3.0.2, which fixes the is...

8.8CVSS7.6AI score0.00456EPSS