By default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users. This vulnerability exists in Apache Superset versions up to and including 2.1.0.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75 | Mailing List |
https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75 | Mailing List |
Configurations
History
21 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75 - Mailing List |
11 Sep 2023, 14:28
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75 - Mailing List | |
CPE | cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
First Time |
Apache
Apache superset |
06 Sep 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-06 13:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39264
Mitre link : CVE-2023-39264
CVE.ORG link : CVE-2023-39264
JSON object : View
Products Affected
apache
- superset
CWE
CWE-209
Generation of Error Message Containing Sensitive Information