CVE-2022-24855
XSS vulnerability in Metabase
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Metabase is an open source business intelligence and analytics application. In affected versions Metabase ships with an internal development endpoint `/_internal` that can allow for cross site scripting (XSS) attacks, potentially leading to phishing attempts with malicious links that could lead to account takeover. Users are advised to either upgrade immediately, or block access in your firewall to `/_internal` endpoints for Metabase. The following patches (or greater versions) are available: 0.42.4 and 1.42.4, 0.41.7 and 1.41.7, 0.40.8 and 1.40.8.
Metabase es una aplicación de análisis e inteligencia empresarial de código abierto. En las versiones afectadas, Metabase es enviado con un endpoint de desarrollo interno "/_internal" que puede permitir ataques de tipo cross site scripting (XSS), conllevando potencialmente a intentos de suplantación de identidad con enlaces maliciosos que podrían conducir a una toma de posesión de la cuenta. Es recomendado a usuarios actualizar inmediatamente o bloquear el acceso en su firewall a los endpoints "/_internal" de Metabase. Están disponibles los siguientes parches (o versiones superiores): versiones 0.42.4 y 1.42.4, 0.41.7 y 1.41.7, 0.40.8 y 1.40.8
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-02-10 CVE Reserved
- 2022-04-14 CVE Published
- 2023-11-05 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/metabase/metabase/releases/tag/v0.42.4 | Release Notes | |
https://github.com/metabase/metabase/security/advisories/GHSA-wjw6-wm9w-7ggr | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Metabase Search vendor "Metabase" | Metabase Search vendor "Metabase" for product "Metabase" | >= 0.40.0 < 0.40.8 Search vendor "Metabase" for product "Metabase" and version " >= 0.40.0 < 0.40.8" | - |
Affected
| ||||||
Metabase Search vendor "Metabase" | Metabase Search vendor "Metabase" for product "Metabase" | >= 0.41.0 < 0.41.7 Search vendor "Metabase" for product "Metabase" and version " >= 0.41.0 < 0.41.7" | - |
Affected
| ||||||
Metabase Search vendor "Metabase" | Metabase Search vendor "Metabase" for product "Metabase" | >= 0.42.0 < 0.42.4 Search vendor "Metabase" for product "Metabase" and version " >= 0.42.0 < 0.42.4" | - |
Affected
| ||||||
Metabase Search vendor "Metabase" | Metabase Search vendor "Metabase" for product "Metabase" | >= 1.40.0 < 1.40.8 Search vendor "Metabase" for product "Metabase" and version " >= 1.40.0 < 1.40.8" | - |
Affected
| ||||||
Metabase Search vendor "Metabase" | Metabase Search vendor "Metabase" for product "Metabase" | >= 1.41.0 < 1.41.7 Search vendor "Metabase" for product "Metabase" and version " >= 1.41.0 < 1.41.7" | - |
Affected
| ||||||
Metabase Search vendor "Metabase" | Metabase Search vendor "Metabase" for product "Metabase" | >= 1.42.0 < 1.42.4 Search vendor "Metabase" for product "Metabase" and version " >= 1.42.0 < 1.42.4" | - |
Affected
|