CVE-2024-24772

A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1. Users are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*

History

12 Feb 2025, 10:15

Type Values Removed Values Added
CWE CWE-20
Summary (en) A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1. Users are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue. (en) A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1. Users are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue.

31 Dec 2024, 16:22

Type Values Removed Values Added
CWE CWE-89
Summary
  • (es) Un usuario invitado podría explotar una API REST de datos de gráficos y enviar instrucciones SQL arbitrarias que, en caso de error, podrían filtrar información de la base de datos de análisis subyacente. Este problema afecta a Apache Superset: antes de la versión 3.0.4, desde la versión 3.1.0 hasta la versión 3.1.1. Se recomienda a los usuarios que actualicen a la versión 3.1.1 o 3.0.4, que soluciona el problema.
CPE cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
First Time Apache superset
Apache
References () http://www.openwall.com/lists/oss-security/2024/02/28/5 - () http://www.openwall.com/lists/oss-security/2024/02/28/5 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5 - () https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5 - Mailing List, Vendor Advisory

21 Nov 2024, 08:59

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/02/28/5 - () http://www.openwall.com/lists/oss-security/2024/02/28/5 -
References () https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5 - () https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5 -

28 Feb 2024, 15:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/02/28/5 -

28 Feb 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 12:15

Updated : 2025-02-12 10:15


NVD link : CVE-2024-24772

Mitre link : CVE-2024-24772

CVE.ORG link : CVE-2024-24772


JSON object : View

Products Affected

apache

  • superset
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')