Apache Superset up to and including 0.38.0 allowed the creation of a Markdown component on a Dashboard page for describing chart's related information. Abusing this functionality, a malicious user could inject javascript code executing unwanted action in the context of the user's browser. The javascript code will be automatically executed (Stored XSS) when a legitimate user surfs on the dashboard page. The vulnerability is exploitable creating a “div” section and embedding in it a “svg” element with javascript code.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0019 Apache Superset up to and including 0.38.0 allowed the creation of a Markdown component on a Dashboard page for describing chart's related information. Abusing this functionality, a malicious user could inject javascript code executing unwanted action in the context of the user's browser. The javascript code will be automatically executed (Stored XSS) when a legitimate user surfs on the dashboard page. The vulnerability is exploitable creating a “div” section and embedding in it a “svg” element with javascript code.
Github GHSA Github GHSA GHSA-w358-rj93-r5qv Apache Superset Stored XSS on Dashboard markdown
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-02-13T16:27:58.281Z

Reserved: 2021-03-02T00:00:00.000Z

Link: CVE-2021-27907

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-05T12:15:12.160

Modified: 2024-11-21T05:58:45.490

Link: CVE-2021-27907

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses