CVE-2023-38646

critical

Description

Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.

References

https://sanjay2610.medium.com/htb-analysis-walkthrough-dd2cb51dbe86?source=rss------security-5

https://www.metabase.com/blog/security-advisory

https://news.ycombinator.com/item?id=36812256

https://github.com/metabase/metabase/releases/tag/v0.46.6.1

https://github.com/metabase/metabase/issues/32552

http://packetstormsecurity.com/files/177138/Metabase-0.46.6-Remote-Code-Execution.html

http://packetstormsecurity.com/files/174091/Metabase-Remote-Code-Execution.html

Details

Source: Mitre, NVD

Published: 2023-07-21

Updated: 2024-02-15

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical