![]() |
|
Message-ID: <7a0cfd0a-17fa-f2aa-00ed-1664b5f1701c@apache.org> Date: Thu, 14 Aug 2025 11:41:18 +0000 From: Daniel Gaspar <dpgaspar@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-55674: Apache Superset: Improper SQL authorisation, parse not checking for specific engine functions Severity: Affected versions: - Apache Superset before 5.0.0 Description: A bypass of the DISALLOWED_SQL_FUNCTIONS security feature in Apache Superset allows for the execution of blocked SQL functions. An attacker can use a special inline block to circumvent the denylist. This allows a user with SQL Lab access to execute functions that were intended to be disabled, leading to the disclosure of sensitive database information like the software version. This issue affects Apache Superset: before 5.0.0. Users are recommended to upgrade to version 5.0.0, which fixes the issue. Credit: Pedro Sousa (coordinator) Beto Dealmeida (remediation developer) d47sec from NCS Viet Nam (reporter) References: https://www.cve.org/CVERecord?id=CVE-2025-55674
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.