Skip to content

CVE-2024-34693: Server Arbitrary File Read in Apache Superset

Notifications You must be signed in to change notification settings

mbadanoiu/CVE-2024-34693

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

CVE-2024-34693: Server Arbitrary File Read in Apache Superset

Improper Input Validation vulnerability in Apache Superset, allows for an authenticated attacker to create a MariaDB connection with local_infile enabled. By enabling local_infile in the Superset MySQL/MariaDB client and pointing the client to a malicious MySQL server, an attacker may launch “LOAD DATA LOCAL INFILE” (Rogue MySQL Server) attacks resulting in reading files from the server and inserting their content in a MariaDB database table.

Vendor Disclosure:

The vendor's disclosure for this vulnerability can be found here.

Requirements:

This vulnerability requires:

  • Valid credentials for a user which can create database connections
    OR
  • Bypassing authentication via known Flask secret

Proof Of Concept:

More details and the exploitation process can be found in this PDF.

Additional Resources:

Bettercap's mysql.server (rogue)

Blogposts from horizon3.ai regarding the exploitation of multiple Superset CVEs from 2023 Part 1 and Part 2

About

CVE-2024-34693: Server Arbitrary File Read in Apache Superset

Topics

Resources

Stars

Watchers

Forks

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy