{"vulnerability": "CVE-2024-55633", "sightings": [{"uuid": "49a5a441-528a-4361-a675-90467256b26f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55633", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113640374538955423", "content": "", "creation_timestamp": "2024-12-12T14:41:44.610863Z"}, {"uuid": "9a391d8e-5ca9-4811-8bd7-2ace406f4e42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55633", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4061", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-55633\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2024-12-12T15:15:17.600\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/bwmd17fcvljt9q4cgctp4v09zh3qs7fb\n2. http://www.openwall.com/lists/oss-security/2024/12/12/1", "creation_timestamp": "2025-02-12T11:08:40.000000Z"}, {"uuid": "34f87359-f7d3-4227-99b2-bb9f98a1cb48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55633", "type": "seen", "source": "https://t.me/cvedetector/12794", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55633 - Apache Superset SQLLab Unauthorized Write\", \n  \"Content\": \"CVE ID : CVE-2024-55633 \nPublished : Dec. 12, 2024, 3:15 p.m. | 44\u00a0minutes ago \nDescription : Improper Authorization vulnerability in Apache Superset. On Postgres analytic databases an attacker with SQLLab access can\u00a0craft a specially designed SQL DML statement\u00a0that is Incorrectly identified as a read-only query, enabling its execution. Non postgres analytics database connections and postgres analytics database connections set with a readonly user (advised) are not vulnerable.\u00a0  \n  \nThis issue affects Apache Superset: before 4.1.0.  \n  \nUsers are recommended to upgrade to version 4.1.0, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T17:11:01.000000Z"}, {"uuid": "b90d4eae-b84c-42f0-951e-dcbc50f317bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55633", "type": "seen", "source": "Telegram/3OR8oaw0RTq8HL2OGCDOcs2xJW3zVnOMxlQrohrUtBpbuTHG", "content": "", "creation_timestamp": "2025-02-14T10:04:57.000000Z"}]}