Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CALSkbjp0m=BbSAVFpiJEHG7=neMvK4sAt7BHndpt-qctDcj9jw@mail.gmail.com>
Date: Mon, 27 Jan 2020 20:36:19 +0000
From: daniel gaspar <danielvazgaspar@...il.com>
To: oss-security@...ts.openwall.com
Subject: [CVE-2020-1932] Apache Incubator Superset user data leak vulnerability

Severity: Medium

Vendor:
The Apache Software Foundation

Product:
Apache Incubator Superset

Versions Affected:
0.34.0
0.34.1
0.35.0
0.35.1

Description:
Authenticated Apache Superset users are able to retrieve to retrieve
other users' information,
including hashed passwords, by accessing an unused and undocumented API
endpoint on Apache Superset.

Mitigation:
Superset users with the mentioned affected versions should upgrade to
0.35.2 or higher

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.