exploitdb
WORKING POC
by MaanVader · pythonwebappsmultiple
https://www.exploit-db.com/exploits/51447
This exploit leverages a known default secret key vulnerability in Apache Superset to forge a session cookie, bypassing authentication. It decodes the session cookie, cracks it using predefined secret keys, and generates a forged cookie for arbitrary user ID impersonation.
Classification
Working Poc 95%
Target:
Apache Superset <= 2.0.1
No auth needed
Prerequisites:
Network access to the target Superset instance · Superset instance using a default or known secret key
nomisec
WORKING POC
111 stars
by horizon3ai · remote
https://github.com/horizon3ai/CVE-2023-27524
This repository contains a functional exploit for CVE-2023-27524, which leverages default Flask SECRET_KEYs to forge session cookies in Apache Superset, allowing authentication bypass. The script can validate exploitability by enumerating databases via the Superset API.
Classification
Working Poc 100%
Target:
Apache Superset (versions with default SECRET_KEYs)
No auth needed
Prerequisites:
Target Superset instance with default SECRET_KEY · Network access to the target
nomisec
WORKING POC
28 stars
by jakabakos · remote
https://github.com/jakabakos/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE
This repository contains a functional exploit for CVE-2023-27524, which leverages a predictable Flask Secret Key in Apache Superset to bypass authentication and achieve remote code execution (RCE). The exploit includes features for session forgery, database enumeration, user enumeration, command execution, and reverse shell capabilities.
Classification
Working Poc 95%
Attack Type
Auth Bypass | Rce
Target:
Apache Superset up to and including 2.0.1
No auth needed
Prerequisites:
Default or predictable Flask Secret Key · Network access to the target Apache Superset instance
nomisec
SCANNER
11 stars
by Okaytc · remote
https://github.com/Okaytc/Superset_auth_bypass_check
This repository contains a scanner for detecting the Apache Superset authentication bypass vulnerability (CVE-2023-27524). It uses a Flask session cookie manager to generate valid session cookies and checks for the presence of the vulnerability by testing access to the Superset welcome page.
Classification
Scanner 90%
Target:
Apache Superset
No auth needed
Prerequisites:
Python 3 environment · Access to the target Superset instance
nomisec
WORKING POC
11 stars
by tardc · poc
https://github.com/tardc/CVE-2023-27524
This repository contains a functional exploit for CVE-2023-27524, an authentication bypass vulnerability in Apache Superset. The exploit leverages default secret keys to forge a session cookie, allowing unauthorized access to the application.
Classification
Working Poc 95%
Target:
Apache Superset
No auth needed
Prerequisites:
Target running Apache Superset with default secret keys
nomisec
WORKING POC
3 stars
by ThatNotEasy · infoleak
https://github.com/ThatNotEasy/CVE-2023-27524
This repository contains a functional exploit for CVE-2023-27524, which targets an insecure default configuration in Apache Superset leading to remote code execution. The exploit leverages known secret keys to forge session cookies and bypass authentication.
Classification
Working Poc 90%
Target:
Apache Superset (versions with known secret keys)
No auth needed
Prerequisites:
Access to the target Superset instance · Known secret keys for session forgery
nomisec
WORKING POC
3 stars
by ZZ-SOCMAP · poc
https://github.com/ZZ-SOCMAP/CVE-2023-27524
This PoC exploits an authentication bypass vulnerability in Apache Superset by leveraging a flawed session cookie mechanism. It sends a request to the login endpoint to obtain a session cookie, then uses that cookie to access a restricted API endpoint without proper authentication.
Classification
Working Poc 95%
Target:
Apache Superset (versions affected by CVE-2023-27524)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Apache Superset · Network access to the target
nomisec
SCANNER
2 stars
by Cappricio-Securities · poc
https://github.com/Cappricio-Securities/CVE-2023-27524
This repository contains a scanner for CVE-2023-27524, which checks for the presence of specific endpoints and responses indicative of the vulnerability in Apache Superset. It does not include exploit code but scans for vulnerable endpoints and provides notifications via Telegram.
Classification
Scanner 90%
Target:
Apache Superset
No auth needed
Prerequisites:
Target URL or list of URLs to scan
nomisec
SCANNER
1 stars
by karthi-the-hacker · infoleak
https://github.com/karthi-the-hacker/CVE-2023-27524
This repository contains a scanner for detecting CVE-2023-27524, an authentication bypass vulnerability in Apache Superset. It checks for vulnerable endpoints by sending HTTP requests and verifying specific response patterns.
Classification
Scanner 90%
Target:
Apache Superset
No auth needed
Prerequisites:
Network access to the target Apache Superset instance
nomisec
WRITEUP
by rachidafaf · poc
https://github.com/rachidafaf/bola-CVE-2023-27524
This repository provides a detailed technical analysis and demonstration of CVE-2023-27524, a Broken Object Level Authorization (BOLA) vulnerability. It includes vulnerable and fixed Flask API implementations to illustrate the vulnerability and its remediation.
Classification
Writeup 95%
Target:
Flask-based API (simulated)
Auth required
Prerequisites:
access to the vulnerable API endpoint · knowledge of user IDs
nomisec
SCANNER
by sumaiyafathima-code · poc
https://github.com/sumaiyafathima-code/CVE-2023-27524
This repository contains a scanner for detecting CVE-2023-27524, an authentication bypass vulnerability in Apache Superset. It checks for vulnerable endpoints by sending HTTP requests and verifying the presence of specific strings in the response.
Classification
Scanner 90%
Target:
Apache Superset
No auth needed
Prerequisites:
target URL or list of URLs to scan
nomisec
WRITEUP
by h1n4mx0 · poc
https://github.com/h1n4mx0/Research-CVE-2023-27524
This repository contains a technical analysis of CVE-2023-27524, an insecure default configuration in Apache Superset leading to authentication bypass. The writeup discusses the use of Flask's SECRET_KEY for session management and how default configurations can be exploited.
Classification
Writeup 90%
Target:
Apache Superset 1.4.1 to 2.0.1
No auth needed
Prerequisites:
Apache Superset with default configuration
nomisec
WORKING POC
by CN016 · remote
https://github.com/CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-
This PoC exploits CVE-2023-27524, an authentication bypass vulnerability in Apache Superset due to hardcoded SECRET_KEY values. It cracks the session cookie using known default keys and forges a new session to bypass authentication.
Classification
Working Poc 95%
Target:
Apache Superset (versions with default SECRET_KEY)
No auth needed
Prerequisites:
Network access to the Superset instance · Superset using a default SECRET_KEY
nomisec
WORKING POC
by necroteddy · remote
https://github.com/necroteddy/CVE-2023-27524
This PoC exploits CVE-2023-27524, an authentication bypass vulnerability in Apache Superset due to the use of default Flask SECRET_KEYs. It retrieves a session cookie, cracks it using known default keys, and forges a new session cookie to impersonate a user.
Classification
Working Poc 95%
Target:
Apache Superset (versions using default Flask SECRET_KEYs)
No auth needed
Prerequisites:
Network access to the target Superset instance · Target using one of the default Flask SECRET_KEYs
github
WORKING POC
by mangjong · pythonpoc
https://github.com/mangjong/Collection-of-PoC/tree/main/CVE/CVE-2023-27524.py
The repository contains functional exploit code for CVE-2023-27524, which is an authentication bypass vulnerability in Apache Superset. The exploit forges a session cookie using known default secret keys to bypass authentication and enumerate databases.
Classification
Working Poc 95%
Target:
Apache Superset (versions with default SECRET_KEY)
No auth needed
Prerequisites:
Target must be using a known default SECRET_KEY · Access to the login endpoint
nomisec
WORKING POC
by MaanVader · remote
https://github.com/MaanVader/CVE-2023-27524-POC
This repository contains a functional exploit for CVE-2023-27524, which leverages default Flask SECRET_KEYs in Apache Superset to forge session cookies, enabling authentication bypass. The script automates the process of retrieving a session cookie, cracking it using known default keys, and generating a forged cookie for admin access.
Classification
Working Poc 95%
Target:
Apache Superset (versions with default SECRET_KEY)
No auth needed
Prerequisites:
Access to the target Superset instance · Default SECRET_KEY in use
vulncheck_xdb
SCANNER
infoleak
https://github.com/Cappricio-Securities/CVE-2023-2752
This repository contains a Python-based scanner for detecting CVE-2023-27524 in Apache Superset. It checks for vulnerable endpoints by sending HTTP requests and analyzing responses for specific indicators like 'database_name' and 'configuration_method'.
Classification
Scanner 95%
Target:
Apache Superset
No auth needed
Prerequisites:
target URL or list of URLs
vulncheck_xdb
WORKING POC
remote
https://github.com/summerainX/vul_poc
The repository contains a functional exploit for CVE-2023-27524, an unauthenticated access vulnerability in Apache Superset. The PoC decrypts session cookies using known secret keys and forges a new session cookie to bypass authentication.
Classification
Working Poc 95%
Target:
Apache Superset (versions < 1.4.1 and others with default secret keys)
No auth needed
Prerequisites:
Target must use one of the known secret keys for session encryption
vulncheck_xdb
WORKING POC
remote
https://github.com/TardC/CVE-2023-27524
This repository contains a functional exploit for CVE-2023-27524, an authentication bypass vulnerability in Apache Superset. The exploit generates forged session cookies using known default secret keys and tests them against the target to determine vulnerability.
Classification
Working Poc 95%
Target:
Apache Superset (versions with insecure default configurations)
No auth needed
Prerequisites:
target URL · default secret keys present in the application