Description
Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting any HTTP verb, etc.
Remediation
References
https://blog.redash.io
https://github.com/getredash/redash/commits/master
https://github.com/getredash/redash/issues/4869
Related Vulnerabilities
CVE-2022-42124 Vulnerability in maven package com.liferay:com.liferay.layout.page.template.service
CVE-2023-48219 Vulnerability in npm package tinymce
CVE-2022-3916 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2011-1184 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2023-32313 Vulnerability in maven package org.webjars.npm:vm2