diff --git a/cves/2021/CVE-2021-41192.yaml b/cves/2021/CVE-2021-41192.yaml index ec05eb0487..a6b6dde06c 100644 --- a/cves/2021/CVE-2021-41192.yaml +++ b/cves/2021/CVE-2021-41192.yaml @@ -1,7 +1,7 @@ id: CVE-2021-41192 info: - name: CVE-2021-41192 + name: Redash Setup Configuration - Default secrets author: bananabr severity: critical description: If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value. @@ -18,15 +18,26 @@ requests: path: - "{{BaseURL}}/invite/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs" - "{{BaseURL}}/redash/invite/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs" + stop-at-first-match: true matchers-condition: and matchers: - type: word words: - "Password" - - "password" - condition: or - type: status status: - 200 + + - method: GET + path: + - "{{BaseURL}}/invite/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs" + - "{{BaseURL}}/redash/invite/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs" + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + words: + - "password" + - type: status + status: - 400 - condition: or \ No newline at end of file