CVE-2023-27524

HIGH KEV NUCLEI

Apache Superset Signed Cookie Priv Esc

Title source: metasploit

Description

Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.

Exploits (20)

exploitdb WORKING POC
by MaanVader · pythonwebappsmultiple
https://www.exploit-db.com/exploits/51447
nomisec WORKING POC 111 stars
by horizon3ai · remote
https://github.com/horizon3ai/CVE-2023-27524
nomisec WORKING POC 28 stars
by jakabakos · remote
https://github.com/jakabakos/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE
nomisec SCANNER 11 stars
by Okaytc · remote
https://github.com/Okaytc/Superset_auth_bypass_check
nomisec WORKING POC 11 stars
by tardc · poc
https://github.com/tardc/CVE-2023-27524
nomisec WORKING POC 3 stars
by ThatNotEasy · infoleak
https://github.com/ThatNotEasy/CVE-2023-27524
nomisec WORKING POC 3 stars
by ZZ-SOCMAP · poc
https://github.com/ZZ-SOCMAP/CVE-2023-27524
nomisec SCANNER 2 stars
by Cappricio-Securities · poc
https://github.com/Cappricio-Securities/CVE-2023-27524
nomisec SCANNER 1 stars
by karthi-the-hacker · infoleak
https://github.com/karthi-the-hacker/CVE-2023-27524
nomisec WRITEUP
by rachidafaf · poc
https://github.com/rachidafaf/bola-CVE-2023-27524
nomisec SCANNER
by sumaiyafathima-code · poc
https://github.com/sumaiyafathima-code/CVE-2023-27524
nomisec WRITEUP
by h1n4mx0 · poc
https://github.com/h1n4mx0/Research-CVE-2023-27524
nomisec WORKING POC
by CN016 · remote
https://github.com/CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-
nomisec WORKING POC
by necroteddy · remote
https://github.com/necroteddy/CVE-2023-27524
github WORKING POC
by mangjong · pythonpoc
https://github.com/mangjong/Collection-of-PoC/tree/main/CVE/CVE-2023-27524.py
nomisec WORKING POC
by MaanVader · remote
https://github.com/MaanVader/CVE-2023-27524-POC
vulncheck_xdb SCANNER
infoleak
https://github.com/Cappricio-Securities/CVE-2023-2752
vulncheck_xdb WORKING POC
remote
https://github.com/summerainX/vul_poc
vulncheck_xdb WORKING POC
remote
https://github.com/TardC/CVE-2023-27524
metasploit WORKING POC
by h00die, paradoxis, Spencer McIntyre, Naveen Sunkavally · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.rb

Nuclei Templates (1)

Apache Superset - Authentication Bypass
CRITICALVERIFIEDby DhiyaneshDK,_0xf4n9x_
Shodan: html:"Apache Superset" || http.favicon.hash:1582430156 || http.html:"apache superset"
FOFA: body="apache superset" || icon_hash=1582430156

Scores

CVSS v3 8.9
EPSS 0.8408
EPSS Percentile 99.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L

Details

CISA KEV 2024-01-08
VulnCheck KEV 2024-01-08
InTheWild.io 2024-01-08
ENISA EUVD EUVD-2023-1207
CWE
CWE-1188
Status published
Products (2)
apache/superset < 2.0.1
pypi/apache-superset 0 - 2.1.0PyPI
Published Apr 24, 2023
KEV Added Jan 08, 2024
Tracked Since Feb 18, 2026