githubEdit

Apache Superset

Data visualization and BI platform. Often runs on Werkzeug/Python.

Default Port: 8088


Discovery

# Nmap
nmap -sV -p 8088 TARGET

# Indicators
# - Server header: Werkzeug/x.x.x Python/x.x.x
# - Title: "Superset"
# - Redirect to /login/
# - Endpoints: /health, /ping, /healthcheck

Common Endpoints:

/login/
/superset/welcome/
/superset/sqllab/
/superset/explore/
/health
/ping
/healthcheck

CVE-2023-27524 - Auth Bypass (Default SECRET_KEY)

Affects: Apache Superset < 2.1.0

Superset uses Flask session cookies signed with a SECRET_KEY. Many instances use the default key, allowing attackers to forge admin session cookies.

Default SECRET_KEY

Exploit - horizon3ai

Output:

Exploit - jakabakos (with RCE)

Use the forged cookie in browser:

  1. Open DevTools → Application → Cookies

  2. Replace session cookie value with forged cookie

  3. Refresh page → Logged in as admin


Post-Auth Exploitation

SQL Lab RCE (PostgreSQL Backend)

Once authenticated, access SQL Lab at /superset/sqllab/

Read Local Files:

Reverse Shell:

Alternative RCE:


Post-Exploitation

Config Files

Extract Password Hashes

Hash Format (PBKDF2-SHA256):

Cracking Superset/Flask Hashes

Convert to hashcat format:


Database Connection Info

If you have access to SQL Lab, database credentials are visible in the connection settings or can be extracted:

Common default connection:


References

  • https://github.com/horizon3ai/CVE-2023-27524

  • https://github.com/jakabakos/CVE-2023-27524-Apache-Superset-Auth-Bypass-and-RCE

Last updated