Learn about CVE-2021-41192 affecting Redash versions 10.0.0 and earlier. Explore the impact, technical details, and steps to prevent session forging by attackers.
Redash is a package for data visualization and sharing. An insecure default configuration in Redash versions 10.0.0 and prior may lead to session forging by attackers.
Understanding CVE-2021-41192
Redash's vulnerability allows attackers to exploit the default secret key to compromise user sessions.
What is CVE-2021-41192?
Redash versions 10.0.0 and earlier use a default secret key, leaving instances vulnerable to session hijacking if environment variables are not explicitly set.
The Impact of CVE-2021-41192
Technical Details of CVE-2021-41192
Redash's vulnerability exposes affected systems to security risks due to insecure default initialization of resources.
Vulnerability Description
Admins not explicitly setting
REDASH_COOKIE_SECRET
or REDASH_SECRET_KEY
face the risk of session forgery using the default secret key.
Affected Systems and Versions
Exploitation Mechanism
Attackers exploit the default secret key in Redash versions 10.0.0 and earlier to forge user sessions.
Mitigation and Prevention
To secure Redash instances, follow these steps:
Immediate Steps to Take
REDASH_COOKIE_SECRET
and REDASH_SECRET_KEY
Long-Term Security Practices
Patching and Updates