Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-27524— Apache Superset: Session validation vulnerability when using provided default SECRET_KEY

CVSS 8.9 · High KEV EPSS 84.03% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-27524

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache Superset: Session validation vulnerability when using provided default SECRET_KEY
Source: NVD (National Vulnerability Database)
Vulnerability Description
Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
不安全的默认资源初始化
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Superset 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Superset是美国阿帕奇(Apache)基金会的一个数据可视化和数据探索平台。 Apache Superset 2.0.1版本及之前版本存在安全漏洞。攻击者利用该漏洞验证和访问未经授权的资源。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Superset 0 ~ 2.0.1 -

II. Public POCs for CVE-2023-27524

#POC DescriptionSource LinkShenlong Link
1Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Supersethttps://github.com/horizon3ai/CVE-2023-27524POC Details
2Apahce-Superset身份认证绕过漏洞(CVE-2023-27524)检测工具https://github.com/Okaytc/Superset_auth_bypass_checkPOC Details
3Apache Superset Auth Bypass Vulnerability CVE-2023-27524.https://github.com/antx-code/CVE-2023-27524POC Details
4A POC for the all new CVE-2023-27524 which allows for authentication bypass and gaining access to the admin dashboard.https://github.com/MaanVader/CVE-2023-27524-POCPOC Details
5Perform With Apache-SuperSet Leaked Token [CSRF]https://github.com/ThatNotEasy/CVE-2023-27524POC Details
6Nonehttps://github.com/TardC/CVE-2023-27524POC Details
7CVE-2023-27524https://github.com/necroteddy/CVE-2023-27524POC Details
8Nonehttps://github.com/jakabakos/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCEPOC Details
9Apache Superset 默认SECRET_KEY 漏洞(CVE-2023-27524)https://github.com/CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-POC Details
10CVE-2023-27524https://github.com/NguyenCongHaiNam/Research-CVE-2023-27524POC Details
11Tool for finding CVE-2023-27524 (Apache Superset - Authentication Bypass)https://github.com/karthi-the-hacker/CVE-2023-27524POC Details
12Tool for finding CVE-2023-27524 (Apache Superset - Authentication Bypass)https://github.com/Cappricio-Securities/CVE-2023-27524POC Details
13Apache Superset Auth Bypass Vulnerability CVE-2023-27524.https://github.com/ZZ-SOCMAP/CVE-2023-27524POC Details
14CVE-2023-27524https://github.com/h1n4mx0/Research-CVE-2023-27524POC Details
15Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-27524.yamlPOC Details
16Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Apache%20Superset%20%E7%A1%AC%E7%BC%96%E7%A0%81%20JWT%20%E5%AF%86%E9%92%A5%E5%AF%BC%E8%87%B4%E8%AE%A4%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2023-27524.mdPOC Details
17https://github.com/vulhub/vulhub/blob/master/superset/CVE-2023-27524/README.mdPOC Details
18Apache Superset Auth Bypass (CVE-2023-27524)https://github.com/tardc/CVE-2023-27524POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-27524

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2023-27524

No comments yet


Leave a comment