Safety vulnerability ID: 65196
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A where_in JINJA macro allows users to specify a quote, which combined with a carefully crafted statement would allow for SQL injection in Apache Superset. This issue affects Apache Superset: before 2.1.2, from 3.0.0 before 3.0.2. Users are recommended to upgrade to version 3.0.2, which fixes the issue.
Latest version: 4.1.1
A modern, enterprise-ready business intelligence web application
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application