Servers Exposed to Remote Code Execution Attacks Owing to Apache Superset Vulnerabilities

Two recently found security flaws in Apache Superset have been patched, potentially opening up the possibility of remote code execution on vulnerable servers.

Version 2.1.1 of the upgrade successfully mitigates CVE-2023-39265 and CVE-2023-37941. If hostile actors are successful in taking over Superset’s metadata database, they may be able to use these flaws to carry out damaging operations.

The most recent Superset version fixes these vulnerabilities in addition to a separate problem with incorrect REST API permissions (CVE-2023-36388). Low-privilege users are no longer able to launch SSRF attacks thanks to this update.

“Superset, as part of its design, allows privileged users to establish connections with various databases and execute arbitrary SQL queries through the potent SQLLab interface,” Naveen Sunkavally from Horizon3.ai revealed in a thorough investigation.

A potential security flaw exists, though: “If Superset can be made to connect to its own metadata database, an attacker can directly access and change application configuration via SQLLab. By doing so, remote code execution and credential theft are made possible.

CVE-2023-39265 is associated with a URI bypass in connecting to the SQLite database utilized for the metastore. Attackers are able to manipulate data thanks to this weakness. Additionally, a vulnerability linked to the lack of validation while importing SQLite database connection details from a file exists under the same CVE number. Importing a ZIP archive file that had been maliciously created might take advantage of this vulnerability. 

Sunkavally also identified CVE-2023-37941 as a vulnerability that affects Superset versions 1.5 to 2.1.0. He clarified that these versions use the pickle module in Python to store particular configuration information.

The problem here is that a malicious pickle payload might be inserted into the store by an attacker with write access to the metadata database. They can then cause this payload’s deserialization, leading to remote code execution. Since it effectively enables an attacker to execute code on the target system, this raises major security concerns.

Only a few months prior, the cybersecurity firm had disclosed another serious problem (CVE-2023-27524, CVSS score: 8.9). These recurrent vulnerabilities underline the significance of rapid software patching and maintenance to thwart malicious actors.

It has been noted that a sizable portion of Superset servers still use default or readily guessed SECRET_KEYs after the bug was made public in April 2023. This is a security risk since systems that use weak or default keys are more susceptible to intrusions. To improve security and lower the danger of exploitation, Horizon3.ai proposes that the product’s maintainers take into account including functionality for automatically creating powerful SECRET_KEYs.

Read Also

By Abdul Wahab

Abdul Wahab is a Software Engineer by profession and a Tech geek by nature. Having been associated with the tech industry for the last five years, he has covered a wide range of Tech topics and produced well-researched and engaging content. You will mostly find him reviewing tech products and writing blog posts. Binge-watching tech reviews and endlessly reading tech blogs are his favorite hobbies.

Show Buttons
Hide Buttons