Skip to content

Latest commit

 

History

History
63 lines (51 loc) · 4.12 KB

File metadata and controls

63 lines (51 loc) · 4.12 KB

Attack Tree Analysis for getredash/redash

Objective: Exfiltrate Data OR Execute Arbitrary Code on Redash Server

Attack Tree Visualization

                                     +-------------------------------------------------+
                                     |  Exfiltrate Data OR Execute Arbitrary Code on   |
                                     |                 Redash Server                   |
                                     +-------------------------------------------------+
                                                  /                 |                 \
                                                 /                  |                  \
          +--------------------------------+   +---------------------+   +--------------------------------+
          |  1. Compromise Data Source   |   | **2. Compromise Redash**|   | 3. Compromise Redash Server   |
          |       Credentials    [!]     |   |   **Application**     |   |        Infrastructure        |
          +--------------------------------+   +---------------------+   +--------------------------------+
                 /                                     /       |                      |
                /                                    /        |                      |
+-------------+                            +--------+ +-------+          +-------+
| 1.1 Weak  |                            | **2.1**| |  2.2   |          |  3.3   |
|  Data     |                            | **Query**| |  User |          |**3rd** |
|  Source  |                            |**Param**| |  Imper|          |**Party**|
|  Creds   |                            | **Vuln**| | sonat|          |**Libs** |
|    [!]    |                            |   [!]  | |  [!]  |          |**Vuln** |
+-------------+                            +--------+ +-------+          +-------+
                                                  |        |                  |
                                                  |        |                  |
                                                  |        |       +--------------------------------+
                                                  |        |       |**3.3.1 Unpatched Vulnerability**|
                                                  |        |       |      **in a Dependency**       |
                                                  |        |       |            **[!]**             |
                                                  |        |       +--------------------------------+
                                                  |        |
                                                  |        +--------------------------------+
                                                  |        | 2.2.1 Weak/Default Admin       |
                                                  |        |       Credentials              |
                                                  |        |            [!]                |
                                                  |        +--------------------------------+
                                                  |
                                                  +--------------------------------+
                                                  |**2.1.1 SQL Injection via Query**|
                                                  |      **Parameters (Redash)**    |
                                                  |            **[!]**             |
                                                  +--------------------------------+

Attack Tree Path: Path 1

Compromise Redash Application ---> Query Parameterization Vulnerabilities ---> SQL Injection via Query Parameters (Redash)

Attack Tree Path: Path 2

Compromise Redash Server Infrastructure ---> 3rd Party Libs Vuln ---> Unpatched Vulnerability in a Dependency

Attack Tree Path: Path 3

Compromise Data Source Credentials ---> Weak Data Source Credentials

Attack Tree Path: Path 4

Compromise Redash Application ---> User Impersonation ---> Weak/Default Admin Credentials