CVE-2024-39887

MEDIUM NUCLEI

Apache Superset < 4.0.2 - SQL Injection

Title source: rule

Description

An SQL Injection vulnerability in Apache Superset exists due to improper neutralization of special elements used in SQL commands. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. To mitigate this, a new configuration key named DISALLOWED_SQL_FUNCTIONS has been introduced. This key disallows the use of the following PostgreSQL functions: version, query_to_xml, inet_server_addr, and inet_client_addr. Additional functions can be added to this list for increased protection. This issue affects Apache Superset: before 4.0.2. Users are recommended to upgrade to version 4.0.2, which fixes the issue.

Nuclei Templates (1)

Apache Superset < 4.0.2 - SQL Injection
MEDIUMVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.favicon.hash:"1582430156" || http.html:"apache superset"
FOFA: body="apache superset" || icon_hash=1582430156

Scores

CVSS v3 4.3
EPSS 0.6006
EPSS Percentile 98.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Classification

CWE
CWE-89
Status published

Affected Products (2)

apache/superset < 4.0.2
pypi/apache-superset < 4.0.2PyPI

Timeline

Published Jul 16, 2024
Tracked Since Feb 18, 2026