mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
109 lines
4.4 KiB
JSON
109 lines
4.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"ID": "CVE-2022-39359",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Metabase's GeoJSON validation doesn't prevent redirects to blocked URLs"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "metabase",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "< 0.41.9"
|
|
},
|
|
{
|
|
"version_value": ">= 0.42.0, < 0.42.6"
|
|
},
|
|
{
|
|
"version_value": ">= 0.43.0, < 0.43.7"
|
|
},
|
|
{
|
|
"version_value": ">= 0.44.0, < 0.44.5"
|
|
},
|
|
{
|
|
"version_value": ">= 1.0.0, < 1.41.9"
|
|
},
|
|
{
|
|
"version_value": ">= 1.42.0, < 1.42.6"
|
|
},
|
|
{
|
|
"version_value": ">= 1.43.0, < 1.43.7"
|
|
},
|
|
{
|
|
"version_value": ">= 1.44.0, < 1.44.5"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "metabase"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, custom GeoJSON map URL address would follow redirects to addresses that were otherwise disallowed, like link-local or private-network. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer follow redirects on GeoJSON map URLs. An environment variable `MB_CUSTOM_GEOJSON_ENABLED` was also added to disable custom GeoJSON completely (`true` by default)."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/metabase/metabase/security/advisories/GHSA-w5j7-4mgm-77f4",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/metabase/metabase/security/advisories/GHSA-w5j7-4mgm-77f4"
|
|
},
|
|
{
|
|
"name": "https://github.com/metabase/metabase/commit/057e2d67fcbeb6b48db68b697e022243e3a5771e",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/metabase/metabase/commit/057e2d67fcbeb6b48db68b697e022243e3a5771e"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-w5j7-4mgm-77f4",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |