[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE-2021-28125: Apache Superset Open Redirect
From:       daniel gaspar <danielvazgaspar () gmail ! com>
Date:       2021-04-27 8:44:07
Message-ID: CALSkbjrM=-cXMznHXnRyoKvAqOkoczWJXzyLpRsmSLubvftkdg () mail ! gmail ! com
[Download RAW message or body]


Description:

Apache Superset up to and including 1.0.1 allowed for the creation of
an external URL that could be malicious. By not checking user input
for open redirects the URL shortener functionality would allow for a
malicious user to create a short URL for a dashboard that could
convince the user to click the link.


Mitigation:

Upgrade to 1.1.0 or above

Credit:

Found and reported by Gianluca Veltri, Dario Castrogiovanni

Reply to: users@superset.apache.org


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic