Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-27524


Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.


Published

2023-04-24T16:15:07.843

Last Modified

2025-03-07T17:07:17.827

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.9 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-1188
  • Type: Primary
    CWE-1188

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache superset ≤ 2.0.1 Yes

References