// For flags

CVE-2022-24853

File system exposure in Metabase

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Metabase is an open source business intelligence and analytics application. Metabase has a proxy to load arbitrary URLs for JSON maps as part of our GeoJSON support. While we do validation to not return contents of arbitrary URLs, there is a case where a particularly crafted request could result in file access on windows, which allows enabling an `NTLM relay attack`, potentially allowing an attacker to receive the system password hash. If you use Windows and are on this version of Metabase, please upgrade immediately. The following patches (or greater versions) are available: 0.42.4 and 1.42.4, 0.41.7 and 1.41.7, 0.40.8 and 1.40.8.

Metabase es una aplicación de análisis e inteligencia empresarial de código abierto. Metabase presenta un proxy para cargar URLs arbitrarias para mapas JSON como parte de nuestro soporte GeoJSON. Mientras comprobamos que no sea devuelto el contenido de URLs arbitrarias, se presenta un caso en el que una petición especialmente diseñada podría resultar en un acceso a un archivo en Windows, lo que permite habilitar un "Ataque de retransmisión NTLM", permitiendo potencialmente a un atacante recibir el hash de la contraseña del sistema. Si usted usa Windows y está en esta versión de Metabase, por favor actualice inmediatamente. Los siguientes parches (o versiones superiores) están disponibles: versiones 0.42.4 y 1.42.4, 0.41.7 y 1.41.7, 0.40.8 y 1.40.8

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-10 CVE Reserved
  • 2022-04-14 CVE Published
  • 2022-08-12 First Exploit
  • 2024-07-06 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.40.0 < 0.40.8
Search vendor "Metabase" for product "Metabase" and version " >= 0.40.0 < 0.40.8"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.41.0 < 0.41.7
Search vendor "Metabase" for product "Metabase" and version " >= 0.41.0 < 0.41.7"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.42.0 < 0.42.4
Search vendor "Metabase" for product "Metabase" and version " >= 0.42.0 < 0.42.4"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.40.0 < 1.40.8
Search vendor "Metabase" for product "Metabase" and version " >= 1.40.0 < 1.40.8"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.41.0 < 1.41.7
Search vendor "Metabase" for product "Metabase" and version " >= 1.41.0 < 1.41.7"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.42.0 < 1.42.4
Search vendor "Metabase" for product "Metabase" and version " >= 1.42.0 < 1.42.4"
-
Affected