Update CVE-2021-41192.yaml
parent
dde0b0f394
commit
04ae5b2e4d
|
@ -3,14 +3,14 @@ id: CVE-2021-41192
|
|||
info:
|
||||
name: Redash Setup Configuration - Default secrets
|
||||
author: bananabr
|
||||
severity: critical
|
||||
severity: high
|
||||
description: If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value.
|
||||
reference:
|
||||
- https://hackerone.com/reports/1380121
|
||||
- https://github.com/getredash/redash/security/advisories/GHSA-g8xr-f424-h2rv
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-41192
|
||||
metadata:
|
||||
shodan-query: http.favicon.hash:247321068
|
||||
shodan-query: http.favicon.hash:698624197
|
||||
tags: cve,cve2021,redash,auth-bypass
|
||||
|
||||
requests:
|
||||
|
@ -18,12 +18,17 @@ requests:
|
|||
path:
|
||||
- "{{BaseURL}}/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"
|
||||
- "{{BaseURL}}/redash/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"
|
||||
|
||||
stop-at-first-match: true
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "password"
|
||||
- "Enter your new password:"
|
||||
- "redash"
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
|
Loading…
Reference in New Issue