Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting any HTTP verb, etc.
References
Link | Resource |
---|---|
https://blog.redash.io | Vendor Advisory |
https://github.com/getredash/redash/issues/4869 | Exploit Vendor Advisory |
https://github.com/getredash/redash/commits/master | Patch Vendor Advisory |
Configurations
Information
Published : 2020-06-11 12:15
Updated : 2020-06-22 06:28
NVD link : CVE-2020-12725
Mitre link : CVE-2020-12725
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
redash
- redash