diff --git a/2022/39xxx/CVE-2022-39362.json b/2022/39xxx/CVE-2022-39362.json index d8c3fed9287..8a431984d9f 100644 --- a/2022/39xxx/CVE-2022-39362.json +++ b/2022/39xxx/CVE-2022-39362.json @@ -1,18 +1,109 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-39362", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Metabase vulnerable to arbitrary SQL execution from queryhash" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "metabase", + "version": { + "version_data": [ + { + "version_value": "< 0.41.9" + }, + { + "version_value": ">= 0.42.0, < 0.42.6" + }, + { + "version_value": ">= 0.43.0, < 0.43.7" + }, + { + "version_value": ">= 0.44.0, < 0.44.5" + }, + { + "version_value": ">= 1.0.0, < 1.41.9" + }, + { + "version_value": ">= 1.42.0, < 1.42.6" + }, + { + "version_value": ">= 1.43.0, < 1.43.7" + }, + { + "version_value": ">= 1.44.0, < 1.44.5" + } + ] + } + } + ] + }, + "vendor_name": "metabase" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, unsaved SQL queries are auto-executed, which could pose a possible attack vector. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer automatically executes ad-hoc native queries. Now the native editor shows the query and gives the user the option to manually run the query if they want." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-356: Product UI does not Warn User of Unsafe Actions" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/metabase/metabase/security/advisories/GHSA-93wj-fgjg-r238", + "refsource": "CONFIRM", + "url": "https://github.com/metabase/metabase/security/advisories/GHSA-93wj-fgjg-r238" + }, + { + "name": "https://github.com/metabase/metabase/commit/b7c6bb905a9187347cfc9035443b514713027a5c", + "refsource": "MISC", + "url": "https://github.com/metabase/metabase/commit/b7c6bb905a9187347cfc9035443b514713027a5c" + } + ] + }, + "source": { + "advisory": "GHSA-93wj-fgjg-r238", + "discovery": "UNKNOWN" } } \ No newline at end of file