CVE-2022-39359
26.10.2022, 19:15
Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, custom GeoJSON map URL address would follow redirects to addresses that were otherwise disallowed, like link-local or private-network. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer follow redirects on GeoJSON map URLs. An environment variable `MB_CUSTOM_GEOJSON_ENABLED` was also added to disable custom GeoJSON completely (`true` by default).
Vendor | Product | Version |
---|---|---|
metabase | metabase | 0.41.0 ≤ 𝑥 < 0.41.9 |
metabase | metabase | 0.42.0 ≤ 𝑥 < 0.42.6 |
metabase | metabase | 0.43.0 ≤ 𝑥 < 0.43.7 |
metabase | metabase | 0.44.0 ≤ 𝑥 < 0.44.5 |
metabase | metabase | 1.41.0 ≤ 𝑥 < 1.41.9 |
metabase | metabase | 1.42.0 ≤ 𝑥 < 1.42.6 |
metabase | metabase | 1.43.0 ≤ 𝑥 < 1.43.7 |
metabase | metabase | 1.44.0 ≤ 𝑥 < 1.44.5 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
References