CVE-2021-43777

MEDIUM

Redash <10.0 - CSRF

Title source: llm
STIX 2.1

Description

Redash is a package for data visualization and sharing. In Redash version 10.0 and prior, the implementation of Google Login (via OAuth) incorrectly uses the `state` parameter to pass the next URL to redirect the user to after login. The `state` parameter should be used for a Cross-Site Request Forgery (CSRF) token, not a static and easily predicted value. This vulnerability does not affect users who do not use Google Login for their instance of Redash. A patch in the `master` and `release/10.x.x` branches addresses this by replacing `Flask-Oauthlib` with `Authlib` which automatically provides and validates a CSRF token for the state variable. The new implementation stores the next URL on the user session object. As a workaround, one may disable Google Login to mitigate the vulnerability.

References (2)

Core 2

Scores

CVSS v3 6.8
EPSS 0.0010
EPSS Percentile 27.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Details

CWE
CWE-601 CWE-352
Status published
Products (1)
redash/redash < 10.0.0
Published Nov 24, 2021
Tracked Since Feb 18, 2026