cvelist/2022/24xxx/CVE-2022-24855.json
advisory-database[bot] 84cac3e3c5
Add CVE-2022-24855 for GHSA-wjw6-wm9w-7ggr
Add CVE-2022-24855 for GHSA-wjw6-wm9w-7ggr
2022-04-14 21:30:59 +00:00

103 lines
4.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-24855",
"STATE": "PUBLIC",
"TITLE": "XSS vulnerability in Metabase"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "metabase",
"version": {
"version_data": [
{
"version_value": ">= 1.40.0, < 1.40.8"
},
{
"version_value": ">= 0.40.0, < 0.40.8"
},
{
"version_value": ">= 1.41.0, < 1.41.7"
},
{
"version_value": ">= 0.41.0, < 0.41.7"
},
{
"version_value": ">= 1.42.0, < 1.42.4"
},
{
"version_value": ">= 0.42.0, < 0.42.4"
}
]
}
}
]
},
"vendor_name": "metabase"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Metabase is an open source business intelligence and analytics application. In affected versions Metabase ships with an internal development endpoint `/_internal` that can allow for cross site scripting (XSS) attacks, potentially leading to phishing attempts with malicious links that could lead to account takeover. Users are advised to either upgrade immediately, or block access in your firewall to `/_internal` endpoints for Metabase. The following patches (or greater versions) are available: 0.42.4 and 1.42.4, 0.41.7 and 1.41.7, 0.40.8 and 1.40.8."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/metabase/metabase/security/advisories/GHSA-wjw6-wm9w-7ggr",
"refsource": "CONFIRM",
"url": "https://github.com/metabase/metabase/security/advisories/GHSA-wjw6-wm9w-7ggr"
},
{
"name": "https://github.com/metabase/metabase/releases/tag/v0.42.4",
"refsource": "MISC",
"url": "https://github.com/metabase/metabase/releases/tag/v0.42.4"
}
]
},
"source": {
"advisory": "GHSA-wjw6-wm9w-7ggr",
"discovery": "UNKNOWN"
}
}