Описание
A stored cross-site scripting (XSS) vulnerability exists in Apache Superset before 3.0.3. An authenticated attacker with create/update permissions on charts or dashboards could store a script or add a specific HTML snippet that would act as a stored XSS.
For 2.X versions, users should change their config to include:
TALISMAN_CONFIG = { "content_security_policy": { "base-uri": ["'self'"], "default-src": ["'self'"], "img-src": ["'self'", "blob:", "data:"], "worker-src": ["'self'", "blob:"], "connect-src": [ "'self'", " https://api.mapbox.com" https://api.mapbox.com" ;, " https://events.mapbox.com" https://events.mapbox.com" ;, ], "object-src": "'none'", "style-src": [ "'self'", "'unsafe-inline'", ], "script-src": ["'self'", "'strict-dynamic'"], }, "content_secu
Ссылки
- Mailing ListMitigationVendor Advisory
- Mailing ListMitigationVendor Advisory
Уязвимые конфигурации
EPSS
9.6 Critical
CVSS3
5.4 Medium
CVSS3
Дефекты
Связанные уязвимости
Уязвимость программного обеспечения визуализации данных Apache Superset, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки
EPSS
9.6 Critical
CVSS3
5.4 Medium
CVSS3