Metabase < 0.44.5

medium Nessus Plugin ID 261771

Synopsis

The remote host is affected by a vulnerability.

Description

The version of Metabase installed on the remote host is prior to 0.44.5. It is, therefore, affected by a The url parameter of the /api/geojson endpoint in Metabase versions < 0.44.5 can be used to perform Server Side Request Forgery attacks. Previously implemented blacklists could be circumvented by leveraging 301 and 302 redirects.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Metabase version 0.44.5 or later.

See Also

https://www.tenable.com/security/research/tra-2022-34

Plugin Details

Severity: Medium

ID: 261771

File Name: metabase_CVE-2022-43776.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 9/9/2025

Updated: 9/9/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: CVE-2022-43776

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:metabase:metabase

Required KB Items: installed_sw/Metabase

Patch Publication Date: 10/26/2022

Vulnerability Publication Date: 10/26/2022

Reference Information

CVE: CVE-2022-43776

CWE: CWE-918