A where_in JINJA macro allows users to specify a quote, which combined with a carefully crafted statement would allow for SQL injection in Apache Superset.This issue affects Apache Superset: before 2.1.2, from 3.0.0 before 3.0.2.
Users are recommended to upgrade to version 3.0.2, which fixes the issue.
{
"cna_assigner": "apache",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/49xxx/CVE-2023-49736.json",
"unresolved_ranges": [
{
"extracted_events": [
{
"fixed": "2.1.2"
},
{
"introduced": "3.0.0"
},
{
"fixed": "3.0.2"
}
],
"source": "AFFECTED_FIELD"
},
{
"extracted_events": [
{
"fixed": "2.1.2"
},
{
"introduced": "3.0.0"
},
{
"fixed": "3.0.2"
}
],
"source": "DESCRIPTION"
}
],
"cwe_ids": [
"CWE-89"
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.1.2"
},
{
"introduced": "3.0.0"
},
{
"fixed": "3.0.2"
}
],
"cpe": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
}