Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-34693
Modified
More InfoOfficial Page
Source-security@apache.org
View Known Exploited Vulnerability (KEV) details
Published At-20 Jun, 2024 | 09:15
Updated At-13 Feb, 2025 | 18:18

Improper Input Validation vulnerability in Apache Superset, allows for an authenticated attacker to create a MariaDB connection with local_infile enabled. If both the MariaDB server (off by default) and the local mysql client on the web server are set to allow for local infile, it's possible for the attacker to execute a specific MySQL/MariaDB SQL command that is able to read files from the server and insert their content on a MariaDB database table.This issue affects Apache Superset: before 3.1.3 and version 4.0.0 Users are recommended to upgrade to version 4.0.1 or 3.1.3, which fixes the issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.8MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CPE Matches

The Apache Software Foundation
apache
>>superset>>Versions before 3.1.3(exclusive)
cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>superset>>Versions from 4.0.0(inclusive) to 4.0.1(exclusive)
cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Secondarysecurity@apache.org
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-20
Type: Secondary
Source: security@apache.org
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2024/06/20/1security@apache.org
Mailing List
https://lists.apache.org/thread/1803x1s34m7r71h1k0q1njol8k6fmyonsecurity@apache.org
Mailing List
http://www.openwall.com/lists/oss-security/2024/06/20/1af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://lists.apache.org/thread/1803x1s34m7r71h1k0q1njol8k6fmyonaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/06/20/1
Source: security@apache.org
Resource:
Mailing List
Hyperlink: https://lists.apache.org/thread/1803x1s34m7r71h1k0q1njol8k6fmyon
Source: security@apache.org
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/06/20/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://lists.apache.org/thread/1803x1s34m7r71h1k0q1njol8k6fmyon
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Change History
0Changes found

Details not found