mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
103 lines
4.1 KiB
JSON
103 lines
4.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"ID": "CVE-2022-24855",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "XSS vulnerability in Metabase"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "metabase",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": ">= 1.40.0, < 1.40.8"
|
|
},
|
|
{
|
|
"version_value": ">= 0.40.0, < 0.40.8"
|
|
},
|
|
{
|
|
"version_value": ">= 1.41.0, < 1.41.7"
|
|
},
|
|
{
|
|
"version_value": ">= 0.41.0, < 0.41.7"
|
|
},
|
|
{
|
|
"version_value": ">= 1.42.0, < 1.42.4"
|
|
},
|
|
{
|
|
"version_value": ">= 0.42.0, < 0.42.4"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "metabase"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Metabase is an open source business intelligence and analytics application. In affected versions Metabase ships with an internal development endpoint `/_internal` that can allow for cross site scripting (XSS) attacks, potentially leading to phishing attempts with malicious links that could lead to account takeover. Users are advised to either upgrade immediately, or block access in your firewall to `/_internal` endpoints for Metabase. The following patches (or greater versions) are available: 0.42.4 and 1.42.4, 0.41.7 and 1.41.7, 0.40.8 and 1.40.8."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 8.7,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/metabase/metabase/security/advisories/GHSA-wjw6-wm9w-7ggr",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/metabase/metabase/security/advisories/GHSA-wjw6-wm9w-7ggr"
|
|
},
|
|
{
|
|
"name": "https://github.com/metabase/metabase/releases/tag/v0.42.4",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/metabase/metabase/releases/tag/v0.42.4"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-wjw6-wm9w-7ggr",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |