Lucene search

K

Redash Security Vulnerabilities

cve
cve

CVE-2020-12725

Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding...

7.2CVSS

6.9AI Score

0.006EPSS

2020-06-11 07:15 PM
24
cve
cve

CVE-2020-36144

Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since the username included in the search filter lacks sanitization.

5.3CVSS

5.1AI Score

0.001EPSS

2021-03-18 08:15 PM
20
6
cve
cve

CVE-2021-41192

Redash is a package for data visualization and sharing. If an admin sets up Redash versions 10.0.0 and prior without explicitly specifying the REDASH_COOKIE_SECRET or REDASH_SECRET_KEY environment variables, a default value is used for both that is the same across all installations. In such cases, ...

8.1CVSS

6.4AI Score

0.007EPSS

2021-11-24 04:15 PM
42
cve
cve

CVE-2021-43777

Redash is a package for data visualization and sharing. In Redash version 10.0 and prior, the implementation of Google Login (via OAuth) incorrectly uses the state parameter to pass the next URL to redirect the user to after login. The state parameter should be used for a Cross-Site Request Forgery...

6.8CVSS

6.3AI Score

0.001EPSS

2021-11-24 04:15 PM
23
cve
cve

CVE-2021-43780

Redash is a package for data visualization and sharing. In versions 10.0 and priorm the implementation of URL-loading data sources like JSON, CSV, or Excel is vulnerable to advanced methods of Server Side Request Forgery (SSRF). These vulnerabilities are only exploitable on installations where a UR...

8.8CVSS

9AI Score

0.001EPSS

2021-11-24 04:15 PM
25