Apache Superset < 2.1.0 Hardcoded Secret Key

critical Web App Scanning Plugin ID 114250

Synopsis

Apache Superset < 2.1.0 Hardcoded Secret Key

Description

Apache Superset versions prior to 2.1.0 uses a default secret to sign cookies. An unauthenticated attacker can use this default value to forge a cookie and authenticate himself as administrator.

Solution

Change the default 'SUPERSET_SECRET_KEY' value or upgrade to Apache Superset 2.1.0 or later.

See Also

https://github.com/apache/superset/commit/412189fcb73268ddd4829d2fdb8381c5e47595ce

https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk

Plugin Details

Severity: Critical

ID: 114250

Type: remote

Published: 4/12/2024

Updated: 4/12/2024

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-27524

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2023-27524

Vulnerability Information

CPE: cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

CISA Known Exploited Vulnerability Due Dates: 1/29/2024

Reference Information

CVE: CVE-2023-27524