PT-2023-2879 · Apache · Apache Superset
Naveen Sunkavally
·
Published
2023-04-24
·
Updated
2025-09-09
·
CVE-2023-27524
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions**
Apache Superset versions up to and including 2.0.1
**Description**
The issue concerns a session validation flaw in Apache Superset, where installations that have not altered the default configured `SECRET KEY` according to installation instructions allow an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for `SECRET KEY` config. The `SECRET KEY` is used to securely sign all session cookies and encrypt sensitive information on the database. Approximately 2,124 servers are potentially affected, with 67% of open internet-facing servers still using the default configuration.
**Recommendations**
For versions up to and including 2.0.1, add a strong `SECRET KEY` to your `superset config.py` file, like `SECRET KEY = <YOUR OWN RANDOM GENERATED SECRET KEY>`. Alternatively, you can set it with the `SUPERSET SECRET KEY` environment variable. As a temporary workaround, consider changing the default `SECRET KEY` to prevent exploitation until a patch is applied or the version is updated. For the best protection, update to version 2.1 or later, which does not allow the server to run with the default `SECRET KEY`.
Exploit
Fix
Weakness Enumeration
Related Identifiers
Affected Products
References · 89
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/apache_superset_cookie_sig_rce.rb⭐ 34302 🔗 14014 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.rb⭐ 34302 🔗 14014 · Exploit
- 🔥 https://github.com/horizon3ai/CVE-2023-27524⭐ 104 🔗 29 · Exploit
- 🔥 https://github.com/jakabakos/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE⭐ 22 🔗 5 · Exploit
- 🔥 https://github.com/Okaytc/Superset_auth_bypass_check⭐ 11 🔗 5 · Exploit
- 🔥 https://github.com/TardC/CVE-2023-27524⭐ 12 🔗 1 · Exploit
- 🔥 https://github.com/ThatNotEasy/CVE-2023-27524⭐ 3 🔗 3 · Exploit
- 🔥 https://github.com/Pari-Malam/CVE-2023-27524⭐ 3 🔗 3 · Exploit
- 🔥 https://github.com/ZZ-SOCMAP/CVE-2023-27524⭐ 3 🔗 2 · Exploit
- 🔥 https://github.com/antx-code/CVE-2023-27524⭐ 3 🔗 2 · Exploit
- 🔥 http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html · Exploit
- 🔥 https://exploit-db.com/exploits/51447 · Exploit
- 🔥 http://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html · Exploit
- 🔥 https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html · Exploit
- 🔥 https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html · Exploit