Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CALSkbjrJaRD51rYCmHr13a8iDepyKKpueJirw0K+tCKwogwyyA@mail.gmail.com>
Date: Mon, 16 Dec 2019 14:16:30 +0000
From: daniel gaspar <danielvazgaspar@...il.com>
To: oss-security@...ts.openwall.com
Subject: [CVE-2019-12413] Apache Incubator Superset meta data leak vulnerability

Severity: Low

Vendor:
The Apache Software Foundation

Product:
Apache Incubator Superset

Versions Affected:
Superset < 0.31

Description:
A user could query database metadata information from a database he has
no access to, by using a specially crafted complex query.

Mitigation:
Superset users with version prior to 0.31 should upgrade to 0.31 or higher

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.