Miggo Logo

CVE-2024-55633: Apache Superset: SQLLab Improper readonly query validation allows unauthorized write access

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.63708%
Published
12/12/2024
Updated
2/11/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
apache-supersetpip< 4.1.04.1.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper SQL query validation in Postgres connections within SQLLab. Since the advisory specifically mentions Postgres analytic databases and improper DML statement detection, the logical point of failure is the engine-specific query validation logic. The PostgresEngineSpec class in Superset contains database-specific handling, and its is_readonly_query method would be responsible for determining if a query is read-only. A flawed implementation here would explain why specially crafted DML statements bypassed validation. The confidence is high because the vulnerability's context directly implicates Postgres-specific query validation, and the function's purpose aligns with the described security flaw.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Improp*r *ut*oriz*tion vuln*r**ility in *p**** Sup*rs*t. On Post*r*s *n*lyti* **t***s*s *n *tt**k*r wit* SQLL** ****ss **n *r**t * sp**i*lly **si*n** SQL *ML st*t*m*nt t**t is In*orr**tly i**nti*i** *s * r***-only qu*ry, *n**lin* its *x**ution. Non p

Reasoning

T** vuln*r**ility st*ms *rom improp*r SQL qu*ry v*li**tion in Post*r*s *onn**tions wit*in SQLL**. Sin** t** **visory sp**i*i**lly m*ntions Post*r*s *n*lyti* **t***s*s *n* improp*r *ML st*t*m*nt **t**tion, t** lo*i**l point o* **ilur* is t** *n*in*-sp