Vulnerabilities > Apache > Medium

DATE CVE VULNERABILITY TITLE RISK
2023-09-06 CVE-2023-37941 Deserialization of Untrusted Data vulnerability in Apache Superset
If an attacker gains write access to the Apache Superset metadata database, they could persist a specifically crafted Python object that may lead to remote code execution on Superset's web backend. The Superset metadata db is an 'internal' component that is typically only accessible directly by the system administrator and the superset process itself.
network
high complexity
apache CWE-502
6.6
2023-09-06 CVE-2023-39265 Improper Input Validation vulnerability in Apache Superset
Apache Superset would allow for SQLite database connections to be incorrectly registered when an attacker uses alternative driver names like sqlite+pysqlite or by using database imports.
network
low complexity
apache CWE-20
6.5
2023-09-06 CVE-2023-27523 Incorrect Authorization vulnerability in Apache Superset
Improper data authorization check on Jinja templated queries in Apache Superset up to and including 2.1.0 allows for an authenticated user to issue queries on database tables they may not have access to.
network
low complexity
apache CWE-863
4.3
2023-09-06 CVE-2023-27526 Incorrect Authorization vulnerability in Apache Superset
A non Admin authenticated user could incorrectly create resources using the import charts feature, on Apache Superset up to and including 2.1.0. 
network
low complexity
apache CWE-863
4.3
2023-09-06 CVE-2023-36387 Incorrect Authorization vulnerability in Apache Superset
An improper default REST API permission for Gamma users in Apache Superset up to and including 2.1.0 allows for an authenticated Gamma user to test database connections.
network
low complexity
apache CWE-863
5.4
2023-09-06 CVE-2023-36388 Server-Side Request Forgery (SSRF) vulnerability in Apache Superset
Improper REST API permission in Apache Superset up to and including 2.1.0 allows for an authenticated Gamma users to test network connections, possible SSRF.
network
low complexity
apache CWE-918
5.4
2023-09-06 CVE-2023-39264 Information Exposure Through an Error Message vulnerability in Apache Superset
By default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users. This vulnerability exists in Apache Superset versions up to and including 2.1.0.
network
low complexity
apache CWE-209
4.3
2023-09-03 CVE-2023-41180 Improper Certificate Validation vulnerability in Apache Nifi Minifi C++ 0.13.0/0.14.0
Incorrect certificate validation in InvokeHTTP on Apache NiFi MiNiFi C++ versions 0.13 to 0.14 allows an intermediary to present a forged certificate during TLS handshake negotation.
network
high complexity
apache CWE-295
5.9
2023-08-25 CVE-2023-41080 Open Redirect vulnerability in multiple products
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application.
network
low complexity
apache debian CWE-601
6.1
2023-08-23 CVE-2023-39441 Improper Certificate Validation vulnerability in Apache Airflow
Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provider before 3.3.0, and Apache Airflow before 2.7.0 are affected by the Validation of OpenSSL Certificate vulnerability. The default SSL context with SSL library did not check a server's X.509 certificate.  Instead, the code accepted any certificate, which could result in the disclosure of mail server credentials or mail contents when the client connects to an attacker in a MITM position. Users are strongly advised to upgrade to Apache Airflow version 2.7.0 or newer, Apache Airflow IMAP Provider version 3.3.0 or newer, and Apache Airflow SMTP Provider version 1.3.0 or newer to mitigate the risk associated with this vulnerability
network
high complexity
apache CWE-295
5.9