Apache Superset
Discovery
# Nmap
nmap -sV -p 8088 TARGET
# Indicators
# - Server header: Werkzeug/x.x.x Python/x.x.x
# - Title: "Superset"
# - Redirect to /login/
# - Endpoints: /health, /ping, /healthcheck/login/
/superset/welcome/
/superset/sqllab/
/superset/explore/
/health
/ping
/healthcheckCVE-2023-27524 - Auth Bypass (Default SECRET_KEY)
Default SECRET_KEY
Exploit - horizon3ai
Exploit - jakabakos (with RCE)
Manual Cookie Forge
Post-Auth Exploitation
SQL Lab RCE (PostgreSQL Backend)
Post-Exploitation
Config Files
Extract Password Hashes
Cracking Superset/Flask Hashes
Database Connection Info
References
Last updated