Vulnerability Details CVE-2021-28125
Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.084
EPSS Ranking 91.9%
CVSS Severity
CVSS v3 Score 6.1
CVSS v2 Score 5.8
Products affected by CVE-2021-28125
-
cpe:2.3:a:apache:superset:-
-
cpe:2.3:a:apache:superset:0.10.0
-
cpe:2.3:a:apache:superset:0.11.0
-
cpe:2.3:a:apache:superset:0.12.0
-
cpe:2.3:a:apache:superset:0.13.0
-
cpe:2.3:a:apache:superset:0.13.1
-
cpe:2.3:a:apache:superset:0.13.2
-
cpe:2.3:a:apache:superset:0.14.0
-
cpe:2.3:a:apache:superset:0.14.1
-
cpe:2.3:a:apache:superset:0.15.0
-
cpe:2.3:a:apache:superset:0.15.1
-
cpe:2.3:a:apache:superset:0.15.2
-
cpe:2.3:a:apache:superset:0.15.3
-
cpe:2.3:a:apache:superset:0.15.4
-
cpe:2.3:a:apache:superset:0.15.4.1
-
cpe:2.3:a:apache:superset:0.16.0
-
cpe:2.3:a:apache:superset:0.16.1
-
cpe:2.3:a:apache:superset:0.17.0
-
cpe:2.3:a:apache:superset:0.17.1
-
cpe:2.3:a:apache:superset:0.17.2
-
cpe:2.3:a:apache:superset:0.17.3
-
cpe:2.3:a:apache:superset:0.17.4
-
cpe:2.3:a:apache:superset:0.17.5
-
cpe:2.3:a:apache:superset:0.17.6
-
cpe:2.3:a:apache:superset:0.18.0
-
cpe:2.3:a:apache:superset:0.18.2
-
cpe:2.3:a:apache:superset:0.18.3
-
cpe:2.3:a:apache:superset:0.18.4
-
cpe:2.3:a:apache:superset:0.18.5
-
cpe:2.3:a:apache:superset:0.19.0
-
cpe:2.3:a:apache:superset:0.19.1
-
cpe:2.3:a:apache:superset:0.2.0
-
cpe:2.3:a:apache:superset:0.2.1
-
cpe:2.3:a:apache:superset:0.20.0
-
cpe:2.3:a:apache:superset:0.20.1
-
cpe:2.3:a:apache:superset:0.20.2
-
cpe:2.3:a:apache:superset:0.20.3
-
cpe:2.3:a:apache:superset:0.20.4
-
cpe:2.3:a:apache:superset:0.20.5
-
cpe:2.3:a:apache:superset:0.20.6
-
cpe:2.3:a:apache:superset:0.21.0
-
cpe:2.3:a:apache:superset:0.21.1
-
cpe:2.3:a:apache:superset:0.21.2
-
cpe:2.3:a:apache:superset:0.22.0
-
cpe:2.3:a:apache:superset:0.22.1
-
cpe:2.3:a:apache:superset:0.23.0
-
cpe:2.3:a:apache:superset:0.23.1
-
cpe:2.3:a:apache:superset:0.23.2
-
cpe:2.3:a:apache:superset:0.23.3
-
cpe:2.3:a:apache:superset:0.24.0
-
cpe:2.3:a:apache:superset:0.25.0
-
cpe:2.3:a:apache:superset:0.25.1
-
cpe:2.3:a:apache:superset:0.25.2
-
cpe:2.3:a:apache:superset:0.25.3
-
cpe:2.3:a:apache:superset:0.25.4
-
cpe:2.3:a:apache:superset:0.25.5
-
cpe:2.3:a:apache:superset:0.25.6
-
cpe:2.3:a:apache:superset:0.26.0
-
cpe:2.3:a:apache:superset:0.26.1
-
cpe:2.3:a:apache:superset:0.26.2
-
cpe:2.3:a:apache:superset:0.26.3
-
cpe:2.3:a:apache:superset:0.27.0
-
cpe:2.3:a:apache:superset:0.28.0
-
cpe:2.3:a:apache:superset:0.28.1
-
cpe:2.3:a:apache:superset:0.29.0
-
cpe:2.3:a:apache:superset:0.31
-
cpe:2.3:a:apache:superset:0.31.0
-
cpe:2.3:a:apache:superset:0.32
-
cpe:2.3:a:apache:superset:0.32.0
-
cpe:2.3:a:apache:superset:0.33.0
-
cpe:2.3:a:apache:superset:0.34.0
-
cpe:2.3:a:apache:superset:0.34.1
-
cpe:2.3:a:apache:superset:0.35.0
-
cpe:2.3:a:apache:superset:0.35.1
-
cpe:2.3:a:apache:superset:0.35.2
-
cpe:2.3:a:apache:superset:0.36.0
-
cpe:2.3:a:apache:superset:0.37.0
-
cpe:2.3:a:apache:superset:0.37.1
-
cpe:2.3:a:apache:superset:0.37.2
-
cpe:2.3:a:apache:superset:0.38.0
-
cpe:2.3:a:apache:superset:0.38.1
-
cpe:2.3:a:apache:superset:0.4.0
-
cpe:2.3:a:apache:superset:0.5.0
-
cpe:2.3:a:apache:superset:0.5.1
-
cpe:2.3:a:apache:superset:0.5.2
-
cpe:2.3:a:apache:superset:0.5.3
-
cpe:2.3:a:apache:superset:0.6.0
-
cpe:2.3:a:apache:superset:0.6.1
-
cpe:2.3:a:apache:superset:0.7.0
-
cpe:2.3:a:apache:superset:0.8.0
-
cpe:2.3:a:apache:superset:0.8.1
-
cpe:2.3:a:apache:superset:0.8.2
-
cpe:2.3:a:apache:superset:0.8.3
-
cpe:2.3:a:apache:superset:0.8.4
-
cpe:2.3:a:apache:superset:0.8.5
-
cpe:2.3:a:apache:superset:0.8.6
-
cpe:2.3:a:apache:superset:0.8.7
-
cpe:2.3:a:apache:superset:0.8.8
-
cpe:2.3:a:apache:superset:0.8.9
-
cpe:2.3:a:apache:superset:0.9.0
-
cpe:2.3:a:apache:superset:0.9.1
-
cpe:2.3:a:apache:superset:1.0.0
-
cpe:2.3:a:apache:superset:1.0.1