CVE-2020-13952: Plaintext password leak in Apache Superset
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.32304%
CWE
Published
4/30/2021
Updated
9/4/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
apache-superset | pip | < 0.37.2 | 0.37.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper template processing in Hive/Presto engines. Engine-specific template processors exposed: 1) The current database connection object with plaintext credentials 2) User password hashes 3) Metadata database contents. These functions
likely provided a Jinja
context with dangerous variables/objects, allowing authenticated users to access sensitive data through SQL template injection (e.g., {{ current_connection.password }}). The high confidence comes from the vulnerability's specific mention of template field exploitation and connection object method
execution, which would require these engine-specific template processors to be the attack surface.