Cross-site Scripting in Apache superset
        
  Critical severity
        
          GitHub Reviewed
      
        Published
          Jan 23, 2024 
          to the GitHub Advisory Database
          •
          Updated Jan 29, 2024 
      
  
Description
        Published by the National Vulnerability Database
      Jan 23, 2024 
    
  
        Published to the GitHub Advisory Database
      Jan 23, 2024 
    
  
        Reviewed
      Jan 23, 2024 
    
  
        Last updated
      Jan 29, 2024 
    
  
A stored cross-site scripting (XSS) vulnerability exists in Apache Superset before 3.0.3. An authenticated attacker with create/update permissions on charts or dashboards could store a script or add a specific HTML snippet that would act as a stored XSS.
For 2.X versions, users should change their config to include:
TALISMAN_CONFIG = {
"content_security_policy": {
"base-uri": ["'self'"],
"default-src": ["'self'"],
"img-src": ["'self'", "blob:", "data:"],
"worker-src": ["'self'", "blob:"],
"connect-src": [
"'self'",
" https://api.mapbox.com" https://api.mapbox.com" ;,
" https://events.mapbox.com" https://events.mapbox.com" ;,
],
"object-src": "'none'",
"style-src": [
"'self'",
"'unsafe-inline'",
],
"script-src": ["'self'", "'strict-dynamic'"],
},
"content_security_policy_nonce_in": ["script-src"],
"force_https": False,
"session_cookie_secure": False,
}
References