CVE-2024-55633: Apache Superset: SQLLab Improper readonly query validation allows unauthorized write access
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.63708%
CWE
Published
12/12/2024
Updated
2/11/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
apache-superset | pip | < 4.1.0 | 4.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper SQL query validation in Postgres connections within SQLLab. Since the advisory specifically mentions Postgres analytic databases and improper DML statement detection, the logical point of failure is the engine-specific query validation logic. The PostgresEngineSpec class in Superset contains database-specific handling, and its is_readonly_query method would be responsible for determining if a query is read-only. A flawed implementation here would explain why specially crafted DML statements bypassed validation. The confidence is high because the vulnerability's context directly implicates Postgres-specific query validation, and the function's purpose aligns with the described security flaw.