CVE-2023-39264

By default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users. This vulnerability exists in Apache Superset versions up to and including 2.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:15

Type Values Removed Values Added
References () https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75 - Mailing List () https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75 - Mailing List

11 Sep 2023, 14:28

Type Values Removed Values Added
References (MISC) https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75 - (MISC) https://lists.apache.org/thread/y65t1of7hb445n86o1vdzjct7rfwlx75 - Mailing List
CPE cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
First Time Apache
Apache superset

06 Sep 2023, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-06 13:15

Updated : 2024-11-21 08:15


NVD link : CVE-2023-39264

Mitre link : CVE-2023-39264

CVE.ORG link : CVE-2023-39264


JSON object : View

Products Affected

apache

  • superset
CWE
CWE-209

Generation of Error Message Containing Sensitive Information