Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-49657", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "state": "PUBLISHED", "assignerShortName": "apache", "dateReserved": "2023-11-28T21:39:07.846Z", "datePublished": "2024-01-23T15:06:59.901Z", "dateUpdated": "2024-08-02T22:01:25.916Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Apache Superset", "vendor": "Apache Software Foundation", "versions": [{"lessThan": "3.0.3", "status": "affected", "version": "0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "reporter", "value": "Nick Barnes, Praetorian Security Inc."}, {"lang": "en", "type": "reporter", "value": "Amit Laish \u2013 GE Vernova"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">A stored cross-site scripting (XSS) vulnerability exists in Apache Superset before 3.0.3. </span>An authenticated attacker with create/update permissions on charts or dashboards could store a script or add a specific HTML snippet that would act as a stored XSS.<br><br>For 2.X versions, users should change their config to include:<br><br>TALISMAN_CONFIG = {<br> \"content_security_policy\": {<br> \"base-uri\": [\"'self'\"],<br> \"default-src\": [\"'self'\"],<br> \"img-src\": [\"'self'\", \"blob:\", \"data:\"],<br> \"worker-src\": [\"'self'\", \"blob:\"],<br> \"connect-src\": [<br> \"'self'\",<br> \"<a target=\"_blank\" rel=\"nofollow\" href=\"https://api.mapbox.com"\">https://api.mapbox.com\"</a>;,<br> \"<a target=\"_blank\" rel=\"nofollow\" href=\"https://events.mapbox.com"\">https://events.mapbox.com\"</a>;,<br> ],<br> \"object-src\": \"'none'\",<br> \"style-src\": [<br> \"'self'\",<br> \"'unsafe-inline'\",<br> ],<br> \"script-src\": [\"'self'\", \"'strict-dynamic'\"],<br> },<br> \"content_security_policy_nonce_in\": [\"script-src\"],<br> \"force_https\": False,<br> \"session_cookie_secure\": False,<br>}<br><br>"}], "value": "A stored cross-site scripting (XSS) vulnerability exists in Apache Superset before 3.0.3.\u00a0An authenticated attacker with create/update permissions on charts or dashboards could store a script or add a specific HTML snippet that would act as a stored XSS.\n\nFor 2.X versions, users should change their config to include:\n\nTALISMAN_CONFIG = {\n\u00a0 \u00a0 \"content_security_policy\": {\n\u00a0 \u00a0 \u00a0 \u00a0 \"base-uri\": [\"'self'\"],\n\u00a0 \u00a0 \u00a0 \u00a0 \"default-src\": [\"'self'\"],\n\u00a0 \u00a0 \u00a0 \u00a0 \"img-src\": [\"'self'\", \"blob:\", \"data:\"],\n\u00a0 \u00a0 \u00a0 \u00a0 \"worker-src\": [\"'self'\", \"blob:\"],\n\u00a0 \u00a0 \u00a0 \u00a0 \"connect-src\": [\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \"'self'\",\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \" https://api.mapbox.com\" https://api.mapbox.com\" ;,\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \" https://events.mapbox.com\" https://events.mapbox.com\" ;,\n\u00a0 \u00a0 \u00a0 \u00a0 ],\n\u00a0 \u00a0 \u00a0 \u00a0 \"object-src\": \"'none'\",\n\u00a0 \u00a0 \u00a0 \u00a0 \"style-src\": [\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \"'self'\",\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \"'unsafe-inline'\",\n\u00a0 \u00a0 \u00a0 \u00a0 ],\n\u00a0 \u00a0 \u00a0 \u00a0 \"script-src\": [\"'self'\", \"'strict-dynamic'\"],\n\u00a0 \u00a0 },\n\u00a0 \u00a0 \"content_security_policy_nonce_in\": [\"script-src\"],\n\u00a0 \u00a0 \"force_https\": False,\n\u00a0 \u00a0 \"session_cookie_secure\": False,\n}\n\n"}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2024-01-29T08:35:38.250Z"}, "references": [{"tags": ["vendor-advisory"], "url": "https://lists.apache.org/thread/wjyvz8om9nwd396lh0bt156mtwjxpsvx"}], "source": {"discovery": "UNKNOWN"}, "title": "Apache Superset: Stored XSS in Dashboard Title and Chart Title", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T22:01:25.916Z"}, "title": "CVE Program Container", "references": [{"tags": ["vendor-advisory", "x_transferred"], "url": "https://lists.apache.org/thread/wjyvz8om9nwd396lh0bt156mtwjxpsvx"}]}]}}