Miggo Logo

CVE-2024-24773: Apache Superset: Improper validation of SQL statements allows for unauthorized access to data

4.9

CVSS Score
3.1

Basic Information

EPSS Score
0.23432%
Published
2/28/2024
Updated
2/13/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
apache-supersetpip<= 3.0.33.0.4
apache-supersetpip>= 3.1.0, < 3.1.13.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of nested SQL in SQLLab. Core query execution functions like execute_sql_statement and SQLQueryRunner.execute would be responsible for parsing/validating SQL input. The lack of recursive authorization checks for nested queries would allow bypassing data scoping. These functions are central to SQL processing in SQLLab and match the described vulnerability pattern, though exact implementation details are inferred without patch diffs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Improp*r p*rsin* o* n*st** SQL st*t*m*nts on SQLL** woul* *llow *ut**nti**t** us*rs to surp*ss t**ir **t* *ut*oriz*tion s*op*. T*is issu* *****ts *p**** Sup*rs*t: ***or* *.*.*, *rom *.*.* ***or* *.*.*. Us*rs *r* r**omm*n*** to up*r*** to v*rsion *.*

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* n*st** SQL in SQLL**. *or* qu*ry *x**ution *un*tions lik* *x**ut*_sql_st*t*m*nt *n* SQLQu*ryRunn*r.*x**ut* woul* ** r*sponsi*l* *or p*rsin*/v*li**tin* SQL input. T** l**k o* r**ursiv* *ut*oriz*tion **