CVE-2022-27479:
SQL injection in apache-superset
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
4/14/2022
Updated
8/31/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
apache-superset | pip | < 1.4.2 | 1.4.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability exists in chart data processing where user-controlled input flows into SQL queries. The ChartRestApi.data endpoint is the primary entry point for chart data requests, making it a logical candidate for improper input handling. SqlaTable.get_query_str is implicated because it handles query construction for SQL-based datasets, a common vector for SQLi if input sanitization fails. Confidence is high for the first function due to its direct role in request handling, and medium for the second due to indirect evidence from Superset's architecture.