CVE-2024-39887
MEDIUM NUCLEIApache Superset < 4.0.2 - SQL Injection
Title source: ruleDescription
An SQL Injection vulnerability in Apache Superset exists due to improper neutralization of special elements used in SQL commands. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. To mitigate this, a new configuration key named DISALLOWED_SQL_FUNCTIONS has been introduced. This key disallows the use of the following PostgreSQL functions: version, query_to_xml, inet_server_addr, and inet_client_addr. Additional functions can be added to this list for increased protection. This issue affects Apache Superset: before 4.0.2. Users are recommended to upgrade to version 4.0.2, which fixes the issue.
Nuclei Templates (1)
Apache Superset < 4.0.2 - SQL Injection
MEDIUMVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.favicon.hash:"1582430156" || http.html:"apache superset"
FOFA:
body="apache superset" || icon_hash=1582430156
Scores
CVSS v3
4.3
EPSS
0.6006
EPSS Percentile
98.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Classification
CWE
CWE-89
Status
published
Affected Products (2)
apache/superset
< 4.0.2
pypi/apache-superset
< 4.0.2PyPI
Timeline
Published
Jul 16, 2024
Tracked Since
Feb 18, 2026