AKuzyashin commented on issue #22960:
URL: https://github.com/apache/superset/issues/22960#issuecomment-2720254227

   Hello Apache Superset team,
   
   I would like to highlight a potential remaining attack vector involving the 
extras.where parameter.
   
   It appears that passing unsanitized user input directly into extras.where or 
extras.having (using  /api/v1/chart/data ) could allow:
   
   SQL Injection: If the input is interpolated into raw SQL without 
parameterization.
   SSTI (Server-Side Template Injection): If the input is processed via Jinja2 
templates without proper sandboxing/validation.
   Example Scenario:
   A malicious actor could craft a WHERE clause like:
   
   `1=1; DELETE FROM your_table; -- `
   
   Or leverage Jinja2 directives (if templates are enabled):
   `{{ 4*'foo' }}`
   
   Let me know if further details or a PoC would be helpful.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to