Redash

Redash

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 09.06.2025 11:00:14
  • Zuletzt bearbeitet 16.07.2025 15:15:33

A vulnerability was found in Redash up to 10.1.0/25.1.0. It has been rated as problematic. This issue affects the function run_query of the file /query_runner/python.py of the component getattr Handler. The manipulation leads to sandbox issue. The co...

Exploit
  • EPSS 88.68%
  • Veröffentlicht 24.11.2021 16:15:14
  • Zuletzt bearbeitet 21.11.2024 06:25:44

Redash is a package for data visualization and sharing. If an admin sets up Redash versions 10.0.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that ...

  • EPSS 0.1%
  • Veröffentlicht 24.11.2021 16:15:14
  • Zuletzt bearbeitet 21.11.2024 06:29:45

Redash is a package for data visualization and sharing. In Redash version 10.0 and prior, the implementation of Google Login (via OAuth) incorrectly uses the `state` parameter to pass the next URL to redirect the user to after login. The `state` para...

  • EPSS 0.23%
  • Veröffentlicht 24.11.2021 16:15:14
  • Zuletzt bearbeitet 21.11.2024 06:29:46

Redash is a package for data visualization and sharing. In versions 10.0 and priorm the implementation of URL-loading data sources like JSON, CSV, or Excel is vulnerable to advanced methods of Server Side Request Forgery (SSRF). These vulnerabilities...

  • EPSS 0.33%
  • Veröffentlicht 18.03.2021 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:28:48

Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since the username included in the search filter lacks sanitization.

Exploit
  • EPSS 0.75%
  • Veröffentlicht 11.06.2020 19:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:09

Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of ...