// For flags

CVE-2023-23628

Metabase subject to Exposure of Sensitive Information to an Unauthorized Actor

Severity Score

4.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Metabase is an open source data analytics platform. Affected versions are subject to Exposure of Sensitive Information to an Unauthorized Actor. Sandboxed users shouldn't be able to view data about other Metabase users anywhere in the Metabase application. However, when a sandbox user views the settings for a dashboard subscription, and another user has added users to that subscription, the sandboxed user is able to view the list of recipients for that subscription. This issue is patched in versions 0.43.7.1, 1.43.7.1, 0.44.6.1, 1.44.6.1, 0.45.2.1, and 1.45.2.1. There are no workarounds.

Metabase es una plataforma de análisis de datos de código abierto. Las versiones afectadas están sujetas a la exposición de información confidencial a un actor no autorizado. Los usuarios del espacio aislado no deberían poder ver datos sobre otros usuarios de Metabase en ninguna parte de la aplicación Metabase. Sin embargo, cuando un usuario del espacio aislado ve la configuración de una suscripción al panel y otro usuario ha agregado usuarios a esa suscripción, el usuario del espacio aislado puede ver la lista de destinatarios de esa suscripción. Este problema se solucionó en las versiones 0.43.7.1, 1.43.7.1, 0.44.6.1, 1.44.6.1, 0.45.2.1 y 1.45.2.1. No hay workarounds.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-01-16 CVE Reserved
  • 2023-01-28 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-20 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
< 0.43.7.1
Search vendor "Metabase" for product "Metabase" and version " < 0.43.7.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.44.0 < 0.44.6.1
Search vendor "Metabase" for product "Metabase" and version " >= 0.44.0 < 0.44.6.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.45.0 < 0.45.2.1
Search vendor "Metabase" for product "Metabase" and version " >= 0.45.0 < 0.45.2.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.0.0 < 1.43.7.1
Search vendor "Metabase" for product "Metabase" and version " >= 1.0.0 < 1.43.7.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.44.0 < 1.44.6.1
Search vendor "Metabase" for product "Metabase" and version " >= 1.44.0 < 1.44.6.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.45.0 < 1.45.2.1
Search vendor "Metabase" for product "Metabase" and version " >= 1.45.0 < 1.45.2.1"
-
Affected