vendor:
Apache Superset
by:
MaanVader
9.8
CVSS
CRITICAL
Authentication Bypass
287
CWE
Product Name: Apache Superset
Affected Version From: Apache Superset <= 2.0.1
Affected Version To: Affected versions not specified
Patch Exists: YES
Related CWE: CVE-2023-27524
CPE: a:apache:superset:2.0.0
Tags: packetstorm,cve,cve2023,apache,superset,auth-bypass
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://github.com/horizon3ai/CVE-2023-27524, https://www.horizon3.ai/cve-2023-27524-insecure-default-configuration-in-apache-superset-leads-to-remote-code-execution/, https://nvd.nist.gov/vuln/detail/CVE-2023-27524, http://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html, http://www.openwall.com/lists/oss-security/2023/04/24/2
Nuclei Metadata: {'max-request': 45, 'verified': True, 'shodan-query': 'html:"Apache Superset"', 'vendor': 'apache', 'product': 'superset'}
Platforms Tested:
2023
Apache Superset 2.0.0 – Authentication Bypass
This exploit allows an attacker to bypass authentication in Apache Superset version 2.0.0. The vulnerability is due to the insecure handling of session cookies, which can be forged by an attacker. By exploiting this vulnerability, an attacker can gain unauthorized access to the Superset instance without valid credentials. The exploit works by decoding the session cookie and forging a new session cookie for a specified user ID. This allows the attacker to impersonate the specified user and gain full access to the Superset instance.
Mitigation:
To mitigate this vulnerability, it is recommended to update to Apache Superset version 2.0.1 or later. Additionally, organizations should enforce strong session management practices and regularly monitor for unauthorized access attempts.