First published: Wed Nov 17 2021(Updated: )
Metabase contains a local file inclusion vulnerability in the custom map support in the API to read GeoJSON formatted data.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metabase | ||
Metabase | =0.40.0 | |
Metabase | =0.40.1 | |
Metabase | =0.40.2 | |
Metabase | =0.40.3 | |
Metabase | =0.40.4 | |
Metabase | =1.40.0 | |
Metabase | =1.40.1 | |
Metabase | =1.40.2 | |
Metabase | =1.40.3 | |
Metabase | =1.40.4 | |
Metabase | =0.40.0 | |
Metabase | =0.40.1 | |
Metabase | =0.40.2 | |
Metabase | =0.40.3 | |
Metabase | =0.40.4 | |
Metabase | =1.40.0 | |
Metabase | =1.40.1 | |
Metabase | =1.40.2 | |
Metabase | =1.40.3 | |
Metabase | =1.40.4 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41277 is a security vulnerability discovered in Metabase, an open source data analytics platform.
The severity of CVE-2021-41277 is critical with a CVSS score of 7.5.
CVE-2021-41277 affects Metabase versions 0.40.0 to 0.40.4 and versions 1.40.0 to 1.40.4.
CVE-2021-41277 allows potential local file inclusion and can expose sensitive information through custom GeoJSON maps in Metabase.
To fix CVE-2021-41277, it is recommended to upgrade Metabase to the latest version available.