CISA KEV 정보
| 취약점명 | Apache Superset Insecure Default Initialization of Resource Vulnerability |
|---|---|
| 설명 | Apache Superset contains an insecure default initialization of a resource vulnerability that allows an attacker to authenticate and access unauthorized resources on installations that have not altered the default configured SECRET_KEY according to installation instructions. |
| 조치사항 | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-1188 |
| 등록일 (KEV) | 2024-01-08 |
| 조치 기한 | 2024-01-29 |
| 추가 참고 | https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk; https://nvd.nist.gov/vuln/detail/CVE-2023-27524 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L설명: Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.
CWE: CWE-1188 | CWE-1188
참조
- https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk [Mailing List, Vendor Advisory]
- https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html [Exploit, Third Party Advisory, VDB Entry]
- https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- https://www.openwall.com/lists/oss-security/2023/04/24/2 [Mailing List]
- https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk [Mailing List, Vendor Advisory]
- https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html [Exploit, Third Party Advisory, VDB Entry]
- https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- https://www.openwall.com/lists/oss-security/2023/04/24/2 [Mailing List]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27524 [Third Party Advisory, US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.