.. / CVE-2021-41192

Exploit for Redash Setup Configuration - Default Secrets Disclosure (CVE-2021-41192)

Description:

Redash Setup Configuration is vulnerable to default secrets disclosure (Insecure Default Initialization of Resource). If an admin sets up Redash versions <=10.0 and prior without explicitly specifying the REDASH_COOKIE_SECRET or REDASH_SECRET_KEY environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value.

Nuclei Template

View the template here CVE-2021-41192.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-41192.yaml
Copy

References:

https://github.com/getredash/redash/commit/ce60d20c4e3d1537581f2f70f1308fe77ab6a214
https://github.com/ARPSyndicate/cvemon
https://hackerone.com/reports/1380121
https://github.com/getredash/redash/security/advisories/GHSA-g8xr-f424-h2rv
https://nvd.nist.gov/vuln/detail/CVE-2021-41192