jgeraigery / metabase-456

The simplest, fastest way to get business intelligence and analytics to everyone in your company :yum:
http://metabase.com
GNU Affero General Public License v3.0
0 stars 0 forks source link

metabasev0.26.0.RC1: 6 vulnerabilities (highest severity is: 8.8) #17

Open mend-for-github-com[bot] opened 1 year ago

mend-for-github-com[bot] commented 1 year ago
Vulnerable Library - metabasev0.26.0.RC1

The simplest, fastest way to get business intelligence and analytics to everyone in your company :yum:

Library home page: https://github.com/metabase/metabase.git

Vulnerable Source Files (1)

/src/metabase/driver/h2.clj

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (metabasev0.26.0.RC1 version) Remediation Possible** Reachability
CVE-2022-39361 High 8.8 Not Defined 0.8% metabasev0.26.0.RC1 Direct v0.41.9,v0.42.6,v0.43.7,v0.44.5,v1.41.9,v1.42.6,v1.43.7,v1.44.5
CVE-2022-39360 Medium 6.5 Not Defined 0.1% detected in multiple dependencies Direct v0.41.9,v0.42.6,v0.43.7,v0.44.5,v1.41.9,v1.42.6,v1.43.7,v1.44.5
CVE-2022-39359 Medium 6.5 Not Defined 0.1% metabasev0.26.0.RC1 Direct v0.41.9,v0.42.6,v0.43.7,v0.44.5,v1.41.9,v1.42.6,v1.43.7,v1.44.5
CVE-2023-23629 Medium 6.3 Not Defined 0.1% detected in multiple dependencies Direct v0.43.7.1,v0.44.6.1,v0.45.2.1,v1.43.7.1,v1.44.6.1,v1.45.2.1
CVE-2023-32680 Medium 5.8 Not Defined 0.1% metabasev0.26.0.RC1 Direct 0.44.7,0.45.4,0.46.3,1.44.7,1.45.4,1.46.3
CVE-2023-23628 Medium 5.7 Not Defined 0.1% detected in multiple dependencies Direct v0.43.7.1,v0.44.6.1,v0.45.2.1,v1.43.7.1,v1.44.6.1,v1.45.2.1

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2022-39361 ### Vulnerable Library - metabasev0.26.0.RC1

The simplest, fastest way to get business intelligence and analytics to everyone in your company :yum:

Library home page: https://github.com/metabase/metabase.git

Found in base branch: master

### Vulnerable Source Files (1)

/src/metabase/driver/h2.clj

### Vulnerability Details

Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, H2 (Sample Database) could allow Remote Code Execution (RCE), which can be abused by users able to write SQL queries on H2 databases. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer allows DDL statements in H2 native queries.

Publish Date: 2022-10-26

URL: CVE-2022-39361

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.8%

### CVSS 3 Score Details (8.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/metabase/metabase/security/advisories/GHSA-gqpj-wcr3-p88v

Release Date: 2022-10-26

Fix Resolution: v0.41.9,v0.42.6,v0.43.7,v0.44.5,v1.41.9,v1.42.6,v1.43.7,v1.44.5

CVE-2022-39360 ### Vulnerable Libraries - metabasev0.26.0.RC1, metabasev0.26.0.RC1

### Vulnerability Details

Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9 single sign on (SSO) users were able to do password resets on Metabase, which could allow a user access without going through the SSO IdP. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase now blocks password reset for all users who use SSO for their Metabase login.

Publish Date: 2022-10-26

URL: CVE-2022-39360

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.1%

### CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39360

Release Date: 2022-10-26

Fix Resolution: v0.41.9,v0.42.6,v0.43.7,v0.44.5,v1.41.9,v1.42.6,v1.43.7,v1.44.5

CVE-2022-39359 ### Vulnerable Library - metabasev0.26.0.RC1

The simplest, fastest way to get business intelligence and analytics to everyone in your company :yum:

Library home page: https://github.com/metabase/metabase.git

Found in base branch: master

### Vulnerable Source Files (1)

/src/metabase/api/geojson.clj

### Vulnerability Details

Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, custom GeoJSON map URL address would follow redirects to addresses that were otherwise disallowed, like link-local or private-network. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer follow redirects on GeoJSON map URLs. An environment variable `MB_CUSTOM_GEOJSON_ENABLED` was also added to disable custom GeoJSON completely (`true` by default).

Publish Date: 2022-10-26

URL: CVE-2022-39359

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.1%

### CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3705

Release Date: 2022-10-26

Fix Resolution: v0.41.9,v0.42.6,v0.43.7,v0.44.5,v1.41.9,v1.42.6,v1.43.7,v1.44.5

CVE-2023-23629 ### Vulnerable Libraries - metabasev0.26.0.RC1, metabasev0.26.0.RC1

### Vulnerability Details

Metabase is an open source data analytics platform. Affected versions are subject to Improper Privilege Management. As intended, recipients of dashboards subscriptions can view the data as seen by the creator of that subscription. This allows someone with greater access to data to create a dashboard subscription, add people with fewer data privileges, and all recipients of that subscription receive the same data: the charts shown in the email would abide by the privileges of the user who created the subscription. The issue is users with fewer privileges who can view a dashboard are able to add themselves to a dashboard subscription created by someone with additional data privileges, and thus get access to more data via email. This issue is patched in versions 0.43.7.1, 1.43.7.1, 0.44.6.1, 1.44.6.1, 0.45.2.1, and 1.45.2.1. On Metabase instances running Enterprise Edition, admins can disable the "Subscriptions and Alerts" permission for groups that have restricted data permissions, as a workaround.

Publish Date: 2023-01-28

URL: CVE-2023-23629

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.1%

### CVSS 3 Score Details (6.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/metabase/metabase/security/advisories/GHSA-ch8f-hhq9-7gv5

Release Date: 2023-01-28

Fix Resolution: v0.43.7.1,v0.44.6.1,v0.45.2.1,v1.43.7.1,v1.44.6.1,v1.45.2.1

CVE-2023-32680 ### Vulnerable Library - metabasev0.26.0.RC1

The simplest, fastest way to get business intelligence and analytics to everyone in your company :yum:

Library home page: https://github.com/metabase/metabase.git

Found in base branch: master

### Vulnerable Source Files (1)

### Vulnerability Details

Metabase is an open source business analytics engine. To edit SQL Snippets, Metabase should have required people to be in at least one group with native query editing permissions to a database–but affected versions of Metabase didn't enforce that requirement. This lack of enforcement meant that: Anyone–including people in sandboxed groups–could edit SQL snippets. They could edit snippets via the API or, in the application UI, when editing the metadata for a model based on a SQL question, and people in sandboxed groups could edit a SQL snippet used in a query that creates their sandbox. If the snippet contained logic that restricted which data that person could see, they could potentially edit that snippet and change their level of data access. The permissions model for SQL snippets has been fixed in Metabase versions 0.46.3, 0.45.4, 0.44.7, 1.46.3, 1.45.4, and 1.44.7. Users are advised to upgrade. Users unable to upgrade should ensure that SQL queries used to create sandboxes exclude SQL snippets.

Publish Date: 2023-05-18

URL: CVE-2023-32680

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.1%

### CVSS 3 Score Details (5.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/metabase/metabase/security/advisories/GHSA-mw6j-f894-4qxv

Release Date: 2023-05-18

Fix Resolution: 0.44.7,0.45.4,0.46.3,1.44.7,1.45.4,1.46.3

CVE-2023-23628 ### Vulnerable Libraries - metabasev0.26.0.RC1, metabasev0.26.0.RC1

### Vulnerability Details

Metabase is an open source data analytics platform. Affected versions are subject to Exposure of Sensitive Information to an Unauthorized Actor. Sandboxed users shouldn't be able to view data about other Metabase users anywhere in the Metabase application. However, when a sandbox user views the settings for a dashboard subscription, and another user has added users to that subscription, the sandboxed user is able to view the list of recipients for that subscription. This issue is patched in versions 0.43.7.1, 1.43.7.1, 0.44.6.1, 1.44.6.1, 0.45.2.1, and 1.45.2.1. There are no workarounds.

Publish Date: 2023-01-28

URL: CVE-2023-23628

### Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.1%

### CVSS 3 Score Details (5.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/metabase/metabase/security/advisories/GHSA-492f-qxr3-9rrv

Release Date: 2023-01-28

Fix Resolution: v0.43.7.1,v0.44.6.1,v0.45.2.1,v1.43.7.1,v1.44.6.1,v1.45.2.1