Количество 2
Количество 2
CVE-2023-43701
Improper payload validation and an improper REST API response type, made it possible for an authenticated malicious actor to store malicious code into Chart's metadata, this code could get executed if a user specifically accesses a specific deprecated API endpoint. This issue affects Apache Superset versions prior to 2.1.2. Users are recommended to upgrade to version 2.1.2, which fixes this issue.
GHSA-wq8q-99p5-xfrw
Apache Superset Cross-site Scripting vulnerability
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-43701 Improper payload validation and an improper REST API response type, made it possible for an authenticated malicious actor to store malicious code into Chart's metadata, this code could get executed if a user specifically accesses a specific deprecated API endpoint. This issue affects Apache Superset versions prior to 2.1.2. Users are recommended to upgrade to version 2.1.2, which fixes this issue. | CVSS3: 4.3 | 0% Низкий | около 2 лет назад | |
GHSA-wq8q-99p5-xfrw Apache Superset Cross-site Scripting vulnerability | CVSS3: 4.3 | 0% Низкий | около 2 лет назад |
Уязвимостей на страницу