Skip to content

CVE-2024-34693: Server Arbitrary File Read in Apache Superset

Notifications You must be signed in to change notification settings

mbadanoiu/CVE-2024-34693

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

CVE-2024-34693: Server Arbitrary File Read in Apache Superset

Improper Input Validation vulnerability in Apache Superset, allows for an authenticated attacker to create a MariaDB connection with local_infile enabled. By enabling local_infile in the Superset MySQL/MariaDB client and pointing the client to a malicious MySQL server, an attacker may launch “LOAD DATA LOCAL INFILE” (Rogue MySQL Server) attacks resulting in reading files from the server and inserting their content in a MariaDB database table.

Vendor Disclosure:

The vendor's disclosure for this vulnerability can be found here.

Requirements:

This vulnerability requires:

  • Valid credentials for a user which can create database connections
    OR
  • Bypassing authentication via known Flask secret

Proof Of Concept:

More details and the exploitation process can be found in this PDF.

Additional Resources:

Bettercap's mysql.server (rogue)

Blogposts from horizon3.ai regarding the exploitation of multiple Superset CVEs from 2023 Part 1 and Part 2

About

CVE-2024-34693: Server Arbitrary File Read in Apache Superset

Topics

Resources

Stars

Watchers

Forks