The Triple Threat Found in Apache Superset
Apache Superset, a cutting-edge business intelligence web application, has recently been under the cybersecurity spotlight due to three significant vulnerabilities. These flaws pose risks ranging from privilege escalation to SQL injection and resource consumption, highlighting the importance of timely updates and vigilant security practices.
CVE-2023-49734 (CVSS 7.7): Apache Superset: Privilege Escalation Vulnerability
This vulnerability allows a lower-privileged user, or ‘Gamma user,’ to gain undue control over chart permissions. This flaw, present in versions before 2.1.2 and from 3.0.0 to 3.0.1, is particularly concerning for its potential to disrupt data integrity.
CVE-2023-49736 (CVSS 6.5): Apache Superset: SQL Injection on where_in JINJA macro
An innovative yet perilous use of the where_in JINJA macro enables SQL injection attacks. This security gap, affecting the same versions as CVE-2023-49734, exposes databases to potential exploitation, underlining the criticality of secure coding practices.
CVE-2023-46104 (CVSS 6.5): Apache Superset: Allows for uncontrolled resource consumption via a ZIP bomb
In a classic case of uncontrolled resource consumption, attackers can upload a ZIP bomb to import databases, dashboards, or datasets. This vulnerability, impacting versions up to 2.1.2 and 3.0.0 to 3.0.1, signifies the risks associated with file upload features.
Apache has responded with updates in versions 3.0.2 and 2.1.3 to address these vulnerabilities. This prompt action underscores the ongoing battle between maintaining functionality and ensuring security in software development.
As Apache Superset evolves, so do the threats it faces. These vulnerabilities serve as a stark reminder of the ever-present need for rigorous security protocols and continuous software updates in safeguarding valuable business intelligence assets.