Description
Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting any HTTP verb, etc.
Remediation
References
https://blog.redash.io
https://github.com/getredash/redash/commits/master
https://github.com/getredash/redash/issues/4869
Related Vulnerabilities
CVE-2014-3652 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2019-1003042 Vulnerability in maven package org.6wind.jenkins:lockable-resources
CVE-2018-12544 Vulnerability in maven package io.vertx:vertx-web-api-contract
CVE-2019-10371 Vulnerability in maven package org.jenkins-ci.plugins:gitlab-oauth
CVE-2023-33201 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk15to18