Vulnerability Details CVE-2020-12725
Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting any HTTP verb, etc.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 72.1%
CVSS Severity
CVSS v3 Score 7.2
CVSS v2 Score 6.5
Products affected by CVE-2020-12725
-
cpe:2.3:a:redash:redash:0.1.29
-
cpe:2.3:a:redash:redash:0.1.30
-
cpe:2.3:a:redash:redash:0.1.31
-
cpe:2.3:a:redash:redash:0.1.32
-
cpe:2.3:a:redash:redash:0.1.35
-
cpe:2.3:a:redash:redash:0.1.45
-
cpe:2.3:a:redash:redash:0.2.58
-
cpe:2.3:a:redash:redash:0.2.60
-
cpe:2.3:a:redash:redash:0.2.62
-
cpe:2.3:a:redash:redash:0.2.64
-
cpe:2.3:a:redash:redash:0.2.70
-
cpe:2.3:a:redash:redash:1.0.1
-
cpe:2.3:a:redash:redash:1.0.2
-
cpe:2.3:a:redash:redash:1.0.3
-
cpe:2.3:a:redash:redash:2.0.0
-
cpe:2.3:a:redash:redash:2.0.1
-
cpe:2.3:a:redash:redash:3.0.0
-
cpe:2.3:a:redash:redash:4.0.0
-
cpe:2.3:a:redash:redash:4.0.1
-
cpe:2.3:a:redash:redash:4.0.2
-
cpe:2.3:a:redash:redash:5.0.0
-
cpe:2.3:a:redash:redash:5.0.1
-
cpe:2.3:a:redash:redash:5.0.2
-
cpe:2.3:a:redash:redash:6.0.0
-
cpe:2.3:a:redash:redash:7.0.0
-
cpe:2.3:a:redash:redash:8.0.0