{"id":"CVE-2023-27524","details":"Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config.\n\nAll superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database.\nAdd a strong SECRET_KEY to your `superset_config.py` file like:\n\nSECRET_KEY = \u003cYOUR_OWN_RANDOM_GENERATED_SECRET_KEY\u003e\n\nAlternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.","aliases":["BIT-superset-2023-27524","GHSA-5cx2-vq3h-x52c"],"modified":"2026-03-15T22:44:40.515474Z","published":"2023-04-24T16:15:07.843Z","references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk"},{"type":"ADVISORY","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27524"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2023/04/24/2"},{"type":"EVIDENCE","url":"https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html"},{"type":"EVIDENCE","url":"https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/superset","events":[{"introduced":"0"},{"last_affected":"507a7562e099707ab1103f4173d6c3b0ade2ec2d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.1"}]}}],"versions":["0.10.0","0.11.0","0.12.0","0.13.1","0.13.2","0.14.1","0.15.0","0.15.1","0.15.3","0.15.4","0.15.4.1","0.16.0","0.16.1","0.17.0","0.17.1","0.17.2","0.17.3","0.17.4","0.17.5","0.17.6","0.18.2","0.18.3","0.18.4","0.18.5","0.19.1","0.2.1","0.20.1","0.25-fork","0.29.0rc1","0.4.0","0.5.0","0.5.1","0.5.2","0.5.3","0.6.0","0.6.1","0.7.0","0.8.0","0.8.3","0.8.4","0.8.5","0.8.6","0.8.7","0.8.8","0.8.9","0.9.0","0.9.1","2.0.0","2.0.0rc1","2.0.0rc2","2.0.1","2.0.1rc1","2.0.1rc6","2020.51.1","airbnb_prod.0.10.0.2","airbnb_prod.0.11.0.1","airbnb_prod.0.11.0.2","airbnb_prod.0.11.0.3","airbnb_prod.0.11.0.4","airbnb_prod.0.11.0.5","airbnb_prod.0.11.0.6","airbnb_prod.0.12.0.1","airbnb_prod.0.12.1.0","airbnb_prod.0.13.0.0","airbnb_prod.0.13.0.1","airbnb_prod.0.13.0.2","airbnb_prod.0.13.0.3","airbnb_prod.0.15.0.1","airbnb_prod.0.15.4.1","airbnb_prod.0.15.4.2","airbnb_prod.0.15.5.0","dummy","rm","superset-helm-chart-0.1.0","superset-helm-chart-0.1.1","superset-helm-chart-0.1.2","superset-helm-chart-0.1.3","superset-helm-chart-0.1.4","superset-helm-chart-0.1.5","superset-helm-chart-0.1.6","superset-helm-chart-0.2.0","superset-helm-chart-0.2.1","superset-helm-chart-0.3.0","superset-helm-chart-0.3.1","superset-helm-chart-0.3.10","superset-helm-chart-0.3.11","superset-helm-chart-0.3.12","superset-helm-chart-0.3.2","superset-helm-chart-0.3.3","superset-helm-chart-0.3.4","superset-helm-chart-0.3.5","superset-helm-chart-0.3.6","superset-helm-chart-0.3.7","superset-helm-chart-0.3.8","superset-helm-chart-0.3.9","superset-helm-chart-0.4.0","superset-helm-chart-0.5.0","superset-helm-chart-0.5.1","superset-helm-chart-0.5.10","superset-helm-chart-0.5.2","superset-helm-chart-0.5.3","superset-helm-chart-0.5.4","superset-helm-chart-0.5.5","superset-helm-chart-0.5.6","superset-helm-chart-0.5.7","superset-helm-chart-0.5.8","superset-helm-chart-0.5.9","superset-helm-chart-0.6.0","superset-helm-chart-0.6.1","superset-helm-chart-0.6.2","superset-helm-chart-0.6.3","test_tag","v2020.51.0","v2021.10.0","v2021.13.0","v2021.15.0","v2021.17.0","v2021.18.0","v2021.19.0","v2021.20.0","v2021.21.0","v2021.22.0","v2021.23.0","v2021.23.1","v2021.24.0","v2021.25.0","v2021.27.0","v2021.27.1","v2021.29.0","v2021.3.0","v2021.31.0","v2021.34.0","v2021.35.0","v2021.36.0","v2021.36.5","v2021.38.0","v2021.40.0","v2021.41.0","v2021.5.0","v2021.5.1","v2021.6.0","v2021.7.0","v2021.8.0","v2021.9.0","v2021.9.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-27524.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}