CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
EPSS
Percentile
66.1%
Improper payload validation and an improper REST API response type, made it possible for an authenticated malicious actor to store malicious code into Chartβs metadata, this code could get executed if a user specifically accesses a specific deprecated API endpoint.Β This issue affects Apache Superset versions prior to 2.1.2.Β
Users are recommended to upgrade to version 2.1.2, which fixes this issue.
[
{
"defaultStatus": "unaffected",
"product": "Apache Superset",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "2.1.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
]