2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-43719" ,
"sourceIdentifier" : "security@apache.org" ,
"published" : "2023-01-16T11:15:10.513" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:27:07.657" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-11-07 21:03:21 +00:00
"value" : "Two legacy REST API endpoints for approval and request access are vulnerable to cross site request forgery. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0.\n\n\n"
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Dos endpoints de API REST heredados para aprobaci\u00f3n y acceso a solicitudes son vulnerables a la Cross Site Request Forgery. Este problema afecta a Apache Superset versi\u00f3n 1.5.2 y versiones anteriores y a la versi\u00f3n 2.0.0."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
2024-04-04 08:46:00 +00:00
"source" : "security@apache.org" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-352"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "1.5.2" ,
"matchCriteriaId" : "CD514249-ED9E-45F1-9D50-4A7CE6DB166B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:superset:2.0.0:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "35CD3C6F-B3E0-437C-A1D7-EF700C76923C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:superset:2.0.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "ADD3485B-3FFC-4B60-89F5-E4ECA0C680B6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:superset:2.0.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC060A49-79ED-4539-9E68-EDB15D7F2445"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://lists.apache.org/thread/xc309h2dphrkg33154djf3nqlh2xc1c0" ,
"source" : "security@apache.org" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://lists.apache.org/thread/xc309h2dphrkg33154djf3nqlh2xc1c0" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}