Beyond Security Blog

Redash open-source 8.0.0 Server-Side Request Forgery (SSRF) Vulnerability

Summary

Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the “JSON” data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected.

Credit:

The information has been provided by Vendor

The original article can be found at:https://blog.redash.io

Details

The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting any HTTP verb, etc.

Vulnerable Systems:

Redash open-source 8.0.0 

CVE Information:

CVE-2020-12725

Disclosure Timeline:
Published Date:6/11/2020

SecuriTeam

SecuriTeam is a small group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.

Please visit our central security portal at securiteam.com to keep up-to-date with the latest security research and read our archives containing over 10,000 articles about CVEs and zero-day exploits.

Contact Us

By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.

Reviews