Apache Superset: Remote Code Execution via Improper Payload Validation and REST API Response Type

Apache Superset: Remote Code Execution via Improper Payload Validation and REST API Response Type

CVE-2023-43701 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Improper payload validation and an improper REST API response type, made it possible for an authenticated malicious actor to store malicious code into Chart's metadata, this code could get executed if a user specifically accesses a specific deprecated API endpoint. This issue affects Apache Superset versions prior to 2.1.2.  Users are recommended to upgrade to version 2.1.2, which fixes this issue.

Learn more about our Cis Benchmark Audit For Apache Http Server.