mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
146 lines
4.9 KiB
JSON
146 lines
4.9 KiB
JSON
{
|
|
"id": "CVE-2022-39358",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2022-10-26T19:15:10.240",
|
|
"lastModified": "2022-10-28T16:04:03.633",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, and 1.42.6, it was possible to circumvent locked parameters when requesting data for a question in an embedded dashboard by constructing a malicious request to the backend. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, and 1.42.6."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Metabase es un software de visualizaci\u00f3n de datos. En versiones anteriores a 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6 y 1.42.6, era posible omitir los par\u00e1metros bloqueados cuando se solicitaban datos para una pregunta en un tablero de mando insertado al construir una petici\u00f3n maliciosa al backend. Este problema est\u00e1 parcheado en versiones 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6 y 1.42.6"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
},
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-667"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.42.0",
|
|
"versionEndExcluding": "0.42.6",
|
|
"matchCriteriaId": "EF01C7BF-CB4C-4990-9082-587CFD555225"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.43.0",
|
|
"versionEndExcluding": "0.43.7",
|
|
"matchCriteriaId": "8858058E-C597-4752-8625-9B279DC65A48"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "0.44.0",
|
|
"versionEndExcluding": "0.44.5",
|
|
"matchCriteriaId": "6A94F7EA-BC18-4013-9A93-7962226FDD98"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "1.42.0",
|
|
"versionEndExcluding": "1.42.6",
|
|
"matchCriteriaId": "73310924-8CD4-4696-89B9-EED3390375A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "1.43.0",
|
|
"versionEndExcluding": "1.43.7",
|
|
"matchCriteriaId": "A86AA0C8-2C4F-4DDD-8371-6B43611E2479"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "1.44.0",
|
|
"versionEndExcluding": "1.44.5",
|
|
"matchCriteriaId": "EF7A60F6-5062-4094-91A5-71445F9B7BC1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/metabase/metabase/security/advisories/GHSA-8qgm-9mj6-36h3",
|
|
"source": "security-advisories@github.com",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |