Apache-Superset-Remote-Code-Execution-PoC-CVE-2018-8021 icon indicating copy to clipboard operation
Apache-Superset-Remote-Code-Execution-PoC-CVE-2018-8021 copied to clipboard

CVE-2018-8021 Proof-Of-Concept and Exploit

Apache Superset pickle library code execution

IBM : Apache Superset could allow a remote attacker to execute arbitrary code on the system, caused by the use of unsafe load method from the pickle library to deserialize data. By sending specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

Refs :

  • https://github.com/apache/incubator-superset/pull/4243
  • https://nvd.nist.gov/vuln/detail/CVE-2018-8021
  • https://exchange.xforce.ibmcloud.com/vulnerabilities/152702

Usage :

usage: exploit.py [-h] -t TCP -tp TPORT -i IP -p PORT -U USER -P PASSW

optional arguments:
  -h, --help            show this help message and exit
  -t TCP, --tcp TCP     tcp ip for shell
  -tp TPORT, --tport TPORT
                        tcp port for shell
  -i IP, --ip IP        ip
  -p PORT, --port PORT  port
  -U USER, --user USER  User belong to Superset 
  -P PASSW, --passw PASSW
                        password of the user !
                        

Note : User and Pass Must belong to a user that can import Dashboards on Superset!!!

Creadits

Please Note Original PoC has been written by David May [[email protected]][https://github.com/DavidMay121]