// For flags

CVE-2023-38646

Metabase 0.46.6 Remote Code Execution

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

30
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.

Metabase versions before 0.46.6.1 contain a flaw where the secret setup-token is accessible even after the setup process has been completed. With this token a user is able to submit the setup functionality to create a new database. When creating a new database, an H2 database string is created with a TRIGGER that allows for code execution. We use a sample database for our connection string to prevent corrupting real databases. Successfully tested against Metabase 0.46.6.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-07-21 CVE Reserved
  • 2023-07-21 CVE Published
  • 2023-07-29 First Exploit
  • 2024-08-02 CVE Updated
  • 2024-11-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (37)
URL Date SRC
https://github.com/robotmikhro/CVE-2023-38646 2023-08-11
https://github.com/Pyr0sec/CVE-2023-38646 2023-10-15
https://github.com/kh4sh3i/CVE-2023-38646 2023-08-19
https://github.com/SUT0L/CVE-2023-38646 2023-10-11
https://github.com/Red4mber/CVE-2023-38646 2023-10-26
https://github.com/AnvithLobo/CVE-2023-38646 2023-10-27
https://github.com/raytheon0x21/CVE-2023-38646 2023-08-11
https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase 2024-02-22
https://github.com/j0yb0y0h/CVE-2023-38646 2023-11-09
https://github.com/xchg-rax-rax/CVE-2023-38646 2024-05-27
https://github.com/threatHNTR/CVE-2023-38646 2023-10-17
https://github.com/Ego1stoo/CVE-2023-38646 2023-11-26
https://github.com/birdm4nw/CVE-2023-38646 2023-10-17
https://github.com/junnythemarksman/CVE-2023-38646 2024-06-04
https://github.com/securezeron/CVE-2023-38646 2023-07-30
https://github.com/0xrobiul/CVE-2023-38646 2023-07-29
https://github.com/nickswink/CVE-2023-38646 2023-10-12
https://github.com/Zenmovie/CVE-2023-38646 2023-07-31
https://github.com/shamo0/CVE-2023-38646-PoC 2023-08-03
https://github.com/fidjiw/CVE-2023-38646-POC 2023-08-03
https://github.com/Chocapikk/CVE-2023-38646 2023-07-30
https://github.com/Xuxfff/CVE-2023-38646-Poc 2023-07-30
https://github.com/alexandre-pecorilla/CVE-2023-38646 2023-10-08
https://github.com/Mrunalkaran/CVE-2023-38646 2023-11-07
https://github.com/asepsaepdin/CVE-2023-38646 2023-10-14
https://github.com/yxl2001/CVE-2023-38646 2023-10-08
https://github.com/passwa11/CVE-2023-38646 2023-10-11
https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646- 2024-02-20
https://github.com/0utl4nder/Another-Metabase-RCE-CVE-2023-38646 2023-12-12
https://github.com/CN016/Metabase-H2-CVE-2023-38646- 2023-10-10
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
< 0.43.7.2
Search vendor "Metabase" for product "Metabase" and version " < 0.43.7.2"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
< 1.43.7.2
Search vendor "Metabase" for product "Metabase" and version " < 1.43.7.2"
enterprise
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.44.0 < 0.44.7.1
Search vendor "Metabase" for product "Metabase" and version " >= 0.44.0 < 0.44.7.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.45.0 < 0.45.4.1
Search vendor "Metabase" for product "Metabase" and version " >= 0.45.0 < 0.45.4.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.46.0 < 0.46.6.1
Search vendor "Metabase" for product "Metabase" and version " >= 0.46.0 < 0.46.6.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.44.0 < 1.44.7.1
Search vendor "Metabase" for product "Metabase" and version " >= 1.44.0 < 1.44.7.1"
enterprise
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.45.0 < 1.45.4.1
Search vendor "Metabase" for product "Metabase" and version " >= 1.45.0 < 1.45.4.1"
enterprise
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.46.0 < 1.46.6.1
Search vendor "Metabase" for product "Metabase" and version " >= 1.46.0 < 1.46.6.1"
enterprise
Affected